1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
|
Network Working Group S. Kelly
Request for Comments: 3457 Airespace
Category: Informational S. Ramamoorthi
Juniper Networks
January 2003
Requirements for IPsec Remote Access Scenarios
Status of this Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (2003). All Rights Reserved.
Abstract
IPsec offers much promise as a secure remote access mechanism.
However, there are a number of differing remote access scenarios,
each having some shared and some unique requirements. A thorough
understanding of these requirements is necessary in order to
effectively evaluate the suitability of a specific set of mechanisms
for any particular remote access scenario. This document enumerates
the requirements for a number of common remote access scenarios.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . 2
1.1 Requirements Terminology . . . . . . . . . . . . . . . . 3
1.2 Reader Prerequisites . . . . . . . . . . . . . . . . . . 3
1.3 General Terminology . . . . . . . . . . . . . . . . . . 4
1.4 Document Content and Organization . . . . . . . . . . . 4
2. Overview . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.1 Endpoint Authentication . . . . . . . . . . . . . . . . 6
2.1.1 Machine-Level Authentication . . . . . . . . . . . 7
2.1.2 User-Level Authentication . . . . . . . . . . . . 7
2.1.3 Combined User/Machine Authentication . . . . . . . 8
2.1.4 Remote Access Authentication . . . . . . . . . . . 8
2.1.5 Compatibility With Legacy Remote Access Mechanisms 9
2.2 Remote Host Configuration . . . . . . . . . . . . . . . 10
2.3 Security Policy Configuration . . . . . . . . . . . . . 11
2.4 Auditing . . . . . . . . . . . . . . . . . . . . . . . . 12
2.5 Intermediary Traversal . . . . . . . . . . . . . . . . . 13
Kelly & Ramamoorthi Informational [Page 1]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
3. Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.1 Telecommuters (Dialup/DSL/Cablemodem) . . . . . . . . . 14
3.1.1 Endpoint Authentication Requirements . . . . . . . 15
3.1.2 Device Configuration Requirements . . . . . . . . 16
3.1.3 Policy Configuration Requirements . . . . . . . . 17
3.1.4 Auditing Requirements . . . . . . . . . . . . . . 18
3.1.5 Intermediary Traversal Requirements . . . . . . . 18
3.2 Corporate to Remote Extranet . . . . . . . . . . . . . . 19
3.2.1 Authentication Requirements . . . . . . . . . . . 19
3.2.2 Device Configuration Requirements . . . . . . . . 20
3.2.3 Policy Configuration Requirements . . . . . . . . 21
3.2.4 Auditing Requirements . . . . . . . . . . . . . . 21
3.2.5 Intermediary Traversal Requirements . . . . . . . 21
3.3 Extranet Laptop to Home Corporate Net . . . . . . . . . 22
3.3.1 Authentication Requirements . . . . . . . . . . . 22
3.3.2 Device Configuration Requirements . . . . . . . . 23
3.3.3 Policy Configuration Requirements . . . . . . . . 23
3.3.4 Auditing Requirements . . . . . . . . . . . . . . 24
3.3.5 Intermediary Traversal Requirements . . . . . . . 24
3.4 Extranet Desktop to Home Corporate Net . . . . . . . . . 25
3.4.1 Authentication Requirements . . . . . . . . . . . 25
3.4.2 Device Configuration Requirements . . . . . . . . 26
3.4.3 Policy Configuration Requirements . . . . . . . . 26
3.4.4 Auditing Requirements . . . . . . . . . . . . . . 26
3.4.5 Intermediary Traversal Requirements . . . . . . . 26
3.5 Public System to Target Network . . . . . . . . . . . . 27
3.5.1 Authentication Requirements . . . . . . . . . . . 27
3.5.2 Device Configuration Requirements . . . . . . . . 28
3.5.3 Policy Configuration Requirements . . . . . . . . 28
3.5.4 Auditing Requirements . . . . . . . . . . . . . . 29
3.5.5 Intermediary Traversal Requirements . . . . . . . 29
4. Scenario Commonalities . . . . . . . . . . . . . . . . . . 29
5. Security Considerations . . . . . . . . . . . . . . . . . . 30
6. References . . . . . . . . . . . . . . . . . . . . . . . . 30
7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . 30
8. Editors' Addresses. . . . . . . . . . . . . . . . . . . . . 30
9. Full Copyright Statement . . . . . . . . . . . . . . . . . 31
1. Introduction
Until recently, remote access has typically been characterized by
dial-up users accessing the target network via the Public Switched
Telephone Network (PSTN), with the dial-up connection terminating at
a Network Access Server (NAS) within the target domain. The
protocols facilitating this have usually been PPP-based, and access
control, authorization, and accounting functions have typically been
provided using one or more of a number of available mechanisms,
including RADIUS [RADIUS].
Kelly & Ramamoorthi Informational [Page 2]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
Note that for such access, it has often been assumed that the
communications infrastructure supporting the ISP connection (the
PSTN) is relatively secure, and poses no significant threats to
communications integrity or confidentiality. Based on this
assumption, connection security has been limited to access control at
the NAS based on username/passphrase pairs. In reality, PSTN dialup
connections have never been impervious to a determined adversary.
The availability of widespread broadband access, in concert with the
desire to reduce the cost of PSTN toll access, have driven the
development of Internet-based remote access mechanisms. In some
cases, PPP-based tunneling mechanisms have been used to provide
remote access by allowing the dial user to first access a local ISP
account, and then tunnel an additional PPP connection over the
Internet into the target network. In the case of broadband users,
such connections are tunneled directly over the Internet. While
these mechanisms have been lacking in terms of security features, the
increasing availability of IPsec renders it possible to provide more
secure remote access to the remote resources via the Internet.
Remote access via the Internet has numerous benefits, financial and
otherwise. However, security is paramount, and this presents strong
incentives for migration from the old dial-up model to a more secure
IPsec-based remote access model. Meeting the security requirements
of various classes of remote access users presents a number of
challenges. It is the aim of this document to explore and enumerate
the requirements of various IPsec remote access scenarios, without
suggesting particular solutions for them.
1.1 Requirements Terminology
The keywords MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD,
SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL, when they appear in this
document, are to be interpreted as described in [3].
1.2 Reader Prerequisites
Reader familiarity with RFCs 2401-2412 is a minimum prerequisite to
understanding the concepts discussed here. Familiarity with concepts
relating to Public Key Infrastructures (PKIs) is also necessary.
Familiarity with RADIUS, PPP, PPTP, L2F, L2TP, and other remote
access support protocols will also be helpful, though not strictly
necessary.
Kelly & Ramamoorthi Informational [Page 3]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
1.3 General Terminology
o Remote Access - this term is used to refer to the case in which
the remote user does not necessarily reside at a fixed location,
i.e., in which the user's IP address is not fixed, and therefore
usually not known prior to connection establishment.
o Secure Remote Access - this term refers to remote access which is
secured using elements of the IPsec protocol suite.
o IPsec Remote Access Client (IRAC)- this term is used to refer to
the remote access user's system.
o IPsec Remote Access Server (IRAS) - this term refers to the device
providing access to the target network. An alternative term is
"Security Gateway".
o Security GateWay (SGW) - this refers to the device providing
access to the target network. An alternative term is IRAS.
o Virtual IP address (VIP) - this term describes an address from a
subnet local to the target network which is assigned to a remote
client, giving the appearance that the remote client actually
resides on the target network.
o Machine-Level Authentication - this term describes the case where
the identity of a machine is verified by virtue of the machine's
possession and application of some combination of authenticators.
For a more complete definition, see section 2.
o User-Level Authentication - this term describes the case where the
identity of a user (as opposed to that of a machine) is verified
by virtue of the user's possession and application of some
combination of authenticators. For a more complete definition,
see section 2.
o NAPT - Network Address/Port Translation
1.4 Document Content and Organization
This document, while initially intended to simply outline
requirements for various remote access scenarios, has come to include
somewhat more than this. This document has evolved from discussion
within the IPsec Remote Access (IPSRA) working group. As a result,
it in some respects documents the evolution of this thought process.
While this represents a departure from the typical form of a
Kelly & Ramamoorthi Informational [Page 4]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
requirements document, the associated historical context should prove
useful in interpreting the conclusions reached in the IPSRA working
group.
The balance of this document is organized as follows: First, there is
a general overview of the basic requirements categories, including
definitions relevant to these categories. Following this is a
section devoted to each remote access scenario. Within each of these
sections there are subsections detailing requirements specific to
that scenario in each of the following areas: endpoint
authentication, remote host configuration, policy configuration,
auditing, and intermediary traversal.
2. Overview
In a very general sense, all secure remote access scenarios have a
similar high-level appearance:
target network
|
| +---+
+-------------+ +-----------+ |---| |
|remote access| Internet | security | | +---+
| client |=============| gateway |--|
| (IRAC) | |(SGW/IRAS) | | +---+
+-------------+ +-----------+ |---| |
| +---+
In all cases, a remote client wishes to securely access resources
either behind a SGW or on an IPsec-protected host, and/or wishes to
provide other (specific) systems with secure access to the client's
own resources. There are numerous details which may differ,
depending on the particular scenario. For example, the IRAC may be
within another corporate network, or connected to an ISP via dialup,
DSL, or CATV media. There may be additional intermediaries between
the remote client and the security gateway, but ultimately, all of
these configurations may be viewed somewhat equivalently from a high
level.
In general, there are several basic categories of requirements
relevant to secure remote access scenarios, including endpoint
authentication, remote host configuration, security policy
configuration, auditing, and intermediary traversal. Endpoint
authentication refers to verification of the identities of the
communication partners (e.g., the IRAC and the IRAS). Remote host
configuration refers to the device configuration parameters of the
IRAC system. Security policy configuration refers to IPsec policy
configuration of both the security gateway and the remote host, and
Kelly & Ramamoorthi Informational [Page 5]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
might also be termed "access control and authorization
configuration". Auditing refers to the generation and collection of
connection status information which is required for the purpose of
maintaining the overall security and integrity of the connected
networks. Intermediary traversal refers to the ability to pass
secured traffic across intermediaries, some of which may modify the
packets in some manner. Such intermediaries include NAPT and
firewall devices. These various categories are treated in more
detail below.
2.1 Endpoint Authentication
Before discussing endpoint authentication with respect to remote
access, it is important to distinguish between data source
authentication and end user authentication. Data source
authentication in the IPsec context consists in providing assurance
that a network packet originates from a specific endpoint, typically
a user, host, or application. IPsec offers mechanisms for this via
AH or ESP. End user authentication within the IPsec context consists
in providing assurance that the endpoint is what or who it claims to
be. IPsec currently offers mechanisms for this as part of IKE
[IKE].
While the two types of authentication differ, they are not unrelated.
In fact, data source authentication relies upon endpoint
authentication, because it is possible to inject packets with a
particular IP address into the Internet from many arbitrary
locations. In many instances, we cannot be certain that a packet
actually originates from a particular host, or even from the network
upon which that host resides. To resolve this, one must first
authenticate the particular endpoint somehow, and then bind the
addressing information (e.g., IP address, protocol, port) of this
endpoint into the trust relationship established by the
authentication process.
In the context of secure remote access, the authenticated entity may
be a machine, a user (application), or both. The authentication
methods currently supported by IPsec range from preshared secrets to
various signature and encryption schemes employing private keys and
their corresponding public key certificates. These mechanisms may be
used to authenticate the end user alone, the device alone, or both
the end user and the device. These are each discussed in more detail
below.
Kelly & Ramamoorthi Informational [Page 6]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
2.1.1 Machine-Level Authentication
In the case where no user input is required in order for an
authentication credential to be used, the entity authenticated will
primarily be the device in which the credential is stored and the
level of derived assurance regarding this authentication is directly
related to how securely the machine's credential is maintained during
both storage and use. That is, a shared secret or a private key
corresponding to a public key certificate may be either stored within
the device or contained in another device which is securely
accessible by the device (e.g., a smartcard). If the knowledge
required for the use of such authentication credentials is entirely
contained within the subject device (i.e., no user input is
required), then it is problematic to state that such credential usage
authenticates anything other than the subject device.
In some cases, a user may be required to satisfy certain criteria
prior to being given access to stored credentials. In such cases,
the level of user authentication provided by the use of such
credentials is somewhat difficult to derive. If sufficiently strong
access controls exist for the system housing the credential, then
there may be a strong binding between the authorized system user and
the credential. However, at the time the credential is presented,
the IRAS itself has no such assurance. That is, the IRAS in
isolation may have some level of assurance that a particular device
(the one in which the credential resides) is the one from which
access is being attempted, but there is no explicit assurance
regarding the identity of the user of the system. In order for the
IRAS to derive additional assurance regarding the user identity, an
additional user credential of some sort would be required. This is
discussed further below.
2.1.2 User-Level Authentication
In some cases, the user may possess an authentication token
(preshared key, private key, passphrase, etc.), and may provide this
or some derivative of this whenever authentication is required. If
this token or derivative is delivered directly to the other endpoint
without modification by the IRAC system, and if the IRAC system
provides no further credentials of its own, then it is the user alone
which has been authenticated. That is, while there may be some
assurance as to the network address from which the user is
originating packets, there is no assurance as to the particular
machine from which the user is attempting access.
Kelly & Ramamoorthi Informational [Page 7]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
2.1.3 Combined User/Machine Authentication
To authenticate both the user and the system, user input of some sort
is required in addition to a credential which is securely stored upon
the device. In some cases, such user input may be used in order to
"complete" the credential stored on the device (e.g., a private key
is password-encrypted), while in others the user's input is supplied
independently of the stored credential. In the case where the
passphrase is applied to the credential prior to use, the level of
assurance derived from successful application of the credential
varies according to your viewpoint.
From the perspective of a system consisting of user, IRAC, IRAS, and
a collection of system protections and security procedures, it may be
said that the user has been authenticated to an extent which depends
upon the strength of the security procedures and system protections
which are in place. However, from the perspective of the IRAS alone,
there is little assurance with respect to user identity. That is,
schemes requiring that stored credentials be modified by user input
prior to use may only be said to provide user-level authentication
within the context of the larger system, and then, the level of
assurance derived is directly proportional to the weakest security
attribute of the entire system.
When considering remote access from a general perspective,
assumptions regarding the overall system are liable to prove
incorrect. This is because the IRAS and the IRAC may not be within
the same domain of control; extranet scenarios are a good example of
this. Hence, the most desirable joint user/machine authentication
mechanisms in this context are those which provide a high level of
assurance to both the IRAS and the IRAC, independently of the larger
system of which the user, IRAS, and IRAC are a part.
2.1.4 Remote Access Authentication
In the general case for remote access, authentication requirements
are typically asymmetric. From the IRAC's perspective, it is
important to ensure that the IRAS at the other end of the connection
is indeed what it seems to be, and not some rogue system masquerading
as the SGW. That is, the IRAC requires machine-level authentication
for the IRAS. This is fairly straightforward, given the
authentication mechanisms supported by IKE and IPsec. Further, this
sort of authentication tends to persist through time, although the
extent of this persistence depends upon the mechanism chosen.
While machine-level authentication for the IRAS is sufficient, this
is not the case for the IRAC. Here, it is often important to know
that the entity at the other end of the connection is one who is
Kelly & Ramamoorthi Informational [Page 8]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
authorized to access local resources rather than someone who happened
upon an unoccupied but otherwise authorized system, or a malicious
Trojan horse application on that user's system, or some other
unauthorized entity. Authenticating the user presents different
requirements than authenticating the user's machine; this requires
some form of user input, and often the authentication must be
periodically renewed.
In situations where a high level of physical security does not exist,
it is common to require a user-input secret as part of the
authentication process, and then to periodically renew the
authentication. Furthermore, since such circumstances may include
the possibility of the presence of a Trojan horse application on the
IRAC system, one-time passphrase mechanisms are often advisable.
Choosing passphrase mechanisms and renewal intervals which provide an
acceptable level of risk, but which do not annoy the user too much,
may be challenging. It should be obvious that even this approach
offers limited assurance in many cases.
Clearly, there are variable assurance levels which are attainable
with the various endpoint authentication techniques, and none of the
techniques discussed offer absolute assurance. Also, there are
variations in the authentication requirements among different remote
access scenarios. This means there is no "cookie cutter" solution
for this problem, and that individual scenarios must be carefully
examined in order to derive specific requirements for each. These
are examined on a case by case basis below in the detailed scenario
descriptions.
2.1.5 Compatibility With Legacy Remote Access Mechanisms
There are a number of currently deployed remote access mechanisms
which were installed prior to the deployment of IPsec. Typically,
these are dialup systems which rely upon RADIUS for user
authentication and accounting, but there are other mechanisms as
well. An ideal IPsec remote access solution might utilize the
components of the underlying framework without modification.
Inasmuch as this is possible, this should be a goal. However, there
may be cases where this simply cannot be accomplished, due to
security and/or other considerations. In such cases, the IPsec
remote access framework should be designed to accommodate migration
from these mechanisms as painlessly as is possible.
In general, proposed IPsec remote access mechanisms should meet the
following goals:
o should provide direct support for legacy user authentication
and accounting systems such as RADIUS
Kelly & Ramamoorthi Informational [Page 9]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
o should encourage migration from existing low-entropy
password-based systems to more secure authentication systems
o if legacy user authentication support cannot be provided
without some sort of migration, the impact of such migration
should be minimized
o user authentication information must be protected against
eavesdropping and replay (including the user identity)
o single sign-on capability should be provided in configurations
employing load-balancing and/or redundancy
o n-factor authentication mechanisms should be supported
2.2 Remote Host Configuration
Remote host configuration refers to the network-related device
configuration of the client system. This configuration may be fixed
or dynamic. It may be completely provided by the administrator of
the network upon which the remote user currently resides (e.g., the
ISP), or it may be partially provided by that administrator, with the
balance provided by an entity on the remote corporate network which
the client is accessing. In general, this configuration may include
the following:
o IP address(es)
o Subnet mask(s)
o Broadcast address(es)
o Host name
o Domain name
o Time offset
o Servers (e.g., SMTP, POP, WWW, DNS/NIS, LPR,
syslog, WINS, NTP, etc. )
o Router(s)
o Router discovery options
o Static routes
o MTU
o Default TTL
o Source routing options
o IP Forwarding enable/disable
o PMTU options
o ARP cache timeout
o X Windows options
o NIS options
o NetBIOS options
o Vendor-specific options
o (other options)
Kelly & Ramamoorthi Informational [Page 10]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
Cases where such configuration is fixed are uninteresting; it is the
cases where specific IRAC configuration occurs as a result of remote
access with which we are concerned. For example, in some cases the
IRAC may be assigned a "virtual address", giving the appearance that
it resides on the target network:
target net
+------------------+ |
| Remote Access | +--------+ | ( ~ ~ ~ ~ ~ )
|+-------+ Client | | | | ( IRAC )
||virtual| | |security| |~~~( virtual )
|| host | |--------|gateway | | ( presence )
|| |<================>| |----| ~ ~ ~ ~ ~
|+-------+ |--------| | |
+------------------+ ^ +--------+ | +--------+
| |---| local |
IPsec tunnel | | host |
with encapsulated | +--------+
traffic inside
In this case, the IRAC system begins with an externally routable
address. An additional target network address is assigned to the
IRAC, and packets containing this assigned address are encapsulated,
with the outer headers containing the IRAC's routable address, and
forwarded to the IRAS through the tunnel. This provides the IRAC
with a virtual presence on the target network via an IPsec tunnel.
Note that the IRAC now has two active addresses: the ISP-assigned
address, and the VIP.
Having obtained this virtual presence on the corporate network, the
IRAC may now require other sorts of topology-related configuration,
e.g., default routers, DNS server(s), etc., just as a dynamically
configured host which physically resides upon the target network
would. It is this sort of configuration with which this requirements
category is concerned.
2.3 Security Policy Configuration
Security policy configuration refers to IPsec access policies for
both the remote access client and the security gateway. It may be
desirable to configure access policies on connecting IRAC systems
which will protect the target network. For example, since a client
has access to the Internet (via its routable address), other systems
on the Internet also have some level of reciprocal access to the
client. In some cases, it may be desirable to block this Internet
Kelly & Ramamoorthi Informational [Page 11]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
access (or force it to pass through the tunnel) while the client has
a tunneled connection to the target network. This is a matter of
client security policy configuration.
For the security gateway, it may also be desirable to dynamically
adjust policies based upon the user with which a connection has been
established. For example, say there are two remote users, named
Alice and Bob. We wish to provide Alice with unrestricted access to
the target network, while we wish to restrict Bob's access to
specific segments. One way to accomplish this would be to statically
assign internal "virtual" addresses to each user in a one-to-one
mapping, so that each user always has the same address. Then, a
particular user's access could be controlled via policies based upon
the particular address. However, this does not scale well.
A more scalable solution for remote client access control would be to
dynamically assign IP addresses from a specific pool based upon the
authenticated endpoint identity, with access to specific resources
controlled by address-based policies in the SGW. This is very
similar to the static mapping described above, except that a given
group of users (those with identical access controls) would share a
given pool of IP addresses (those which are granted the required
access), rather than a given user always mapping to a given address.
However, this also has scaling issues, though not as pronounced as
for the static mapping.
Alternatively, an arbitrary address could be assigned to a user, with
the security gateway's policy being dynamically updated based upon
the identity of the remote client (and its assigned virtual address)
to permit access to particular resources. In these cases, the
relevant security policy configuration is specific to the IRAS,
rather than to the IRAC. Both IRAS and IRAC security policy
configuration are encompassed by this requirements category.
2.4 Auditing
Auditing is used here to refer to the collection and reporting of
connection status information by the IRAS, for the purpose of
maintaining the security and integrity of the IRAS protected network.
For remote access, the following auditing information is useful from
a security perspective:
o connection start time
o connection end time
Note that the requirement for a connection-end-time attribute implies
the need for a connection heartbeat mechanism of some sort so that
the IRAS can accurately determine this quantity in cases where the
Kelly & Ramamoorthi Informational [Page 12]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
IRAC does not explicitly terminate the connection. Also note that
the heartbeat mechanism in this case is always directed from the IRAC
to the IRAS.
In some cases, use of a heartbeat may negatively influence a
connection. For example, if the heartbeat interval is very short,
and the connection is reset after loss of very few heartbeat packets,
there is a possibility that network congestion could lead to
unnecessary connection resets. The heartbeat interval and reset
threshold should be chosen with this in mind, and it should be
possible to adjust these quantities either through configuration or
negotiation.
2.5 Intermediary Traversal
Intermediary traversal is used here to refer to passing a secured
data stream through an intermediary such as a firewall or NAPT
device. In the case of firewalls, numerous deployed products do not
recognize the IPsec protocol suite, making it difficult (sometimes
impossible) to configure them to pass it through. In such cases, a
mechanism is required for making the data stream appear to be of a
type which the firewall is capable of managing.
In the case of NAPT devices, there are a number of issues with
attempting to pass an encrypted or authenticated data stream. For
example, NAPT devices typically modify the source IP address and
UDP/TCP port of outgoing packets, and the destination IP address and
UDP/TCP port of incoming packets, and in some cases, they modify
additional fields in the data portion of the packet. Such
modifications render the use of the AH protocol impossible. In the
case of ESP, the UDP/TCP port fields are sometimes unreadable and
always unmodifiable, making meaningful translation by the NAPT device
impossible. There are numerous other protocol-field combinations
which suffer similarly. This requirements category is concerned with
these issues.
3. Scenarios
There are numerous remote access scenarios possible using IPsec.
This section contains a brief summary enumeration of these, followed
by a subsection devoted to each which explores the various
requirements in terms of the categories defined above.
The following scenarios are discussed:
o dialup/dsl/cablemodem telecommuters using their systems to access
remote resources
Kelly & Ramamoorthi Informational [Page 13]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
o extranet users using local corporate systems to access the remote
company network of a business partner
o extranet users using their own system within another company's
network to access their home corporate network
o extranet users using a business partner's system (located on that
partner's network) to access their home corporate network
o remote users using a borrowed system (e.g., an airport kiosk) to
access target network resources
3.1 Telecommuters (Dialup/DSL/Cablemodem)
The telecommuter scenario is one of the more common remote access
scenarios. The convenience and wide availability of Internet access
makes this an attractive option under many circumstances. Users may
access the Internet from the comfort of their homes or hotel rooms,
and using this Internet connection, access the resources of a target
network. In some cases, dialup accounts are used to provide the
initial Internet access, while in others some type of "always-on"
connection such as a DSL or CATV modem is used.
The dialup and always-on cases are very similar, with two significant
differences: address assignment mechanism and connection duration.
In most dialup cases, the IRAC's IP address is dynamically assigned
as part of connection setup, and with fairly high likelihood, it is
different each time the IRAC connects. DSL/CATV users, on the other
hand, often have static IP addresses assigned to them, although
dynamic assignment is on the increase. As for connection duration,
dialup remote access connections are typically short-lived, while
always-on connections may maintain remote access connections for
significantly longer periods of time.
The general configuration in either case looks like this:
corporate net
| +----+
+-----+ +-----+ /---/ Internet +---+ |--| |
|IRAC |---|modem|------|ISP|==========|SGW|--| +----+
+-----+ +-----+ /---/ +---+ |
|
An alternative to this configuration entails placing a security
gateway between the user's system and the modem, in which case this
added SGW becomes the IRAC. This is currently most common in cases
where DSL/CATV connections are used.
Kelly & Ramamoorthi Informational [Page 14]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
3.1.1 Endpoint Authentication Requirements
The authentication requirements of this scenario depend in part upon
the general security requirements of the network to which access is
to be provided. Assuming that the corporate SGW is physically
secure, machine authentication for the SGW is sufficient. If this
assumption regarding physical security is incorrect, it is not clear
that stronger authentication for the SGW could be guaranteed, and
derivation of an effective mechanism for that case is beyond the
scope of this document.
For the IRAC, there are numerous threats to the integrity of the user
authentication process. Due to the open nature of common consumer
operating systems, some of these threats are quite difficult to
protect against. For example, it is very difficult to assert, with
any level of certainty, that a single user system which permits the
downloading and running of arbitrary applications from the Internet
has not been compromised, and that a covert application is not
monitoring and interacting with the user's data at any point in time.
However, there are 2 general threats we might realistically hope to
somehow mitigate with appropriate authentication mechanisms if we can
assume that the system has not been compromised in this manner.
First, there is the possibility that a secure connection is
established for a particular user, but that someone other than the
intended user is currently using that connection. Second, there is
the possibility that the user's credential (password, hardware token,
etc.) has been somehow compromised, and is being used by someone
other than the authorized user to gain access.
Mitigation of the first threat, the possibility that someone other
than the authorized user is currently using the connection, requires
periodic renewal of user authentication. It should be clear that
machine authentication will not suffice in this case, and that
requiring periodic re-entry of an unchanging user password (which may
be written on a post-it note which is stuck to the user's monitor)
will have limited effectiveness. Convincing verification of the
continued presence of the authorized user will, in many cases,
require periodic application of a time-variant credential.
Mitigation of the second threat, credential compromise, is difficult,
and depends upon a number of factors. If the IRAC system is running
a highly secure operating system, then a time-variant credential may
again offer some value. A static password is clearly deficient in
this scenario, since it may be subject to either online or offline
guessing, and eventually compromised - which is the threat we are
attempting to mitigate. However, if the IRAC operating system is not
Kelly & Ramamoorthi Informational [Page 15]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
hardened, the use of a time-variant credential is only effective if
simultaneous access from more than one location is forbidden, and if
the credential generation mechanism is not easily compromised.
A second approach to the credential compromise problem entails using
a PKI-based credential which is stored within a secure container of
some sort, and which requires some user interaction prior to
operation (e.g., a smartcard). If such a credential requires
periodic user interaction to continue operating (e.g., pin re-entry),
this may help to limit the access of an unauthorized user who happens
upon a connected but unattended systems. However, choosing an
acceptable refresh interval is a difficult problem, and if the pin is
not
time-variant, this provides limited additional assurance.
To summarize, the following are the authentication requirements for
the IRAS and IRAC:
IRAS
----
o machine authentication MUST be provided.
IRAC
----
o support for user authentication SHOULD be provided
o support for either user or machine authentication MUST be provided
o support for user authentication MUST be provided if protection
from unauthorized connection use is desired.
o if user authentication is provided for short-lived dialup
connections, periodic renewal MAY occur
o if user authentication is provided for always-on connections,
periodic renewal SHOULD occur
3.1.2 Device Configuration Requirements
There are 2 possibilities for device configuration in the
telecommuter scenario: either access to the target network is
permitted for the native ISP-assigned address of the telecommuter's
system, or the telecommuter's system is assigned a virtual address
from within the target address space. In the first case, there are
no device configuration requirements which are not already satisfied
by the ISP. However, this case is the exception, rather than the
rule.
The second case is far more common, due to the numerous benefits
derived by providing the IRAC with a virtual presence on the target
Kelly & Ramamoorthi Informational [Page 16]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
network. For example, the virtual presence allows the client to
receive subnet broadcasts, which permits it to use WINS on the target
network. In addition, if the IRAC tunnels all traffic to the target
network, then the target policy can be applied to Internet traffic
to/from the IRAC.
In this case, the IRAC requires, at minimum, assignment of an IP
address from the target network. Typically, the IRAC requires
anywhere from several more to many more elements of configuration
information, depending upon the corporate network's level of
topological complexity. For a fairly complete list, see section 2.2.
To summarize, the following are the device configuration requirements
for the IRAC:
o support for a virtual IP (VIP) address MAY be provided
o if VIP support is provided, support for all device-related
parameters listed in section 2.2 above SHOULD be provided
o support for address assignment based upon authenticated
identity MAY be provided
o if authenticated address assignment is not supported, an
identity-based dynamic policy update mechanism such as is
described in [ARCH] MUST be supported.
3.1.3 Policy Configuration Requirements
In terms of IRAC policy configuration, the most important issue
pertains to whether the IRAC has direct Internet access enabled (for
browsing, etc.) while a connection to the target network exists.
This is important since the fact that the IRAC has access to sites on
the Internet implies that those sites have some level of reciprocal
access to the IRAC. It may be desirable to completely eliminate this
type of access while a tunnel is active.
Alternatively, the risks may be mitigated somewhat by forcing all
Internet-bound packets leaving the IRAC to first traverse the tunnel
to the target network, where they may be subjected to target network
policy. A second approach which carries a bit less overhead entails
modifying the IRAC's policy configuration to reflect that of the
target network during the time the IRAC is connected. In this case,
traffic is not forced to loop through the target site prior to
exiting or entering the IRAC. This requires some sort of policy
download (or modification) capability as part of the SA establishment
process. A third approach is to provide a configuration variable for
the IRAC which permits specification of "tunnel-all", or "block all
traffic not destined for the target network while the SA is up".
Kelly & Ramamoorthi Informational [Page 17]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
In terms of IRAS configuration, it may be necessary to dynamically
update the security policy database (SPD) when the remote user
connects. This is because transit selectors must be based upon
network address parameters, but these cannot be known a priori in the
remote access case. As is noted above, this may be avoided by
provision of a mechanism which permits address assignment based upon
authenticated identity.
To summarize, the following are the policy configuration requirements
for the IRAS and IRAC:
IRAS
----
o dynamic policy update mechanism based upon identity and
assigned address MAY be supported.
o if address assignment-based policy update mechanism is not
supported, address assignment based upon authenticated identity
SHOULD be supported.
IRAC
----
o IRAC SHOULD provide ability to configure for "tunnel-all"
and/or "block-all" for traffic not destined for the remote
network to which IPsec remote access is being provided.
o support for dynamic IRAS update of IRAC policy MAY be provided.
3.1.4 Auditing Requirements
For telecommuter sessions, session start/end times must be collected.
Reliable derivation of session end time requires that the IRAC
somehow periodically signify that the connection remains active.
This is implied if the IRAS receives data from the IRAC over the
connection, but in cases where no data is sent for some period of
time, a signaling mechanism is required by which the IRAC indicates
that the connection remains in use.
3.1.5 Intermediary Traversal Requirements
If the address assigned by the ISP to the IRAC system is globally
routable, and no intermediate devices between the IRAC and the IRAS
perform NAPT operations on the data stream, then there are no
additional requirements. If NAPT operations are performed on the
data stream, some mechanism must be provided in order to render these
modifications transparent to the IPsec implementation.
Kelly & Ramamoorthi Informational [Page 18]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
3.2 Corporate to Remote Extranet
Extranets are becoming increasingly common, especially as IPsec
becomes more widely deployed. In this scenario, a user from one
corporation uses a local corporate system to access resources on
another corporation's network. Typically, these corporations are
cooperating on some level, but not to the degree that unbridled
access between the two networks would be acceptable. Hence, this
scenario is characterized by limited access. The general topological
appearance is similar to this:
CORP A CORP B
| |
+----+ | | +-----+
|USER|---| |--| S1 |
+----+ | +------++ ++------+ | +-----+
|---|SGW/FW||===Internet===||SGW/FW|---|
| +------++ ++------+ | +-----+
| SGW-A SGW-B |--| S2 |
| | +-----+
This is purposely simplified in order to illustrate some basic
characteristics without getting bogged down in details. At the edge
of each network is a combination security gateway and firewall
device. These are labeled "SGW-A" and "SGW-B". In this diagram,
corporation B wishes to provide a user from corporation A with access
to servers S1 and/or S2. This may be accomplished in one of several
different ways:
1) an end-to-end SA is formed from USER to S1 or S2
2) a tunnel-mode SA is formed between SGW-A and SGW-B which only
permits traffic between S1/S2 and USER.
3) a tunnel-mode SA is formed between USER and SGW-B which only
permits traffic between S1/S2 and USER.
These various cases are individually discussed with respect to each
requirements category below.
3.2.1 Authentication Requirements
For the corporate extranet scenario, the authentication requirements
vary slightly depending upon the manner in which the connection is
accomplished. If only a particular user is permitted to access
S1/S2, then user-level authentication is required. If connection
types (1) or (3) are used, this may be accomplished in the same
manner as it would be for a telecommuter. If connection type (2) is
Kelly & Ramamoorthi Informational [Page 19]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
used, one of two things must occur: either SGW-A must provide some
local mechanism for authenticating USER and SGW-B must trust this
mechanism, or SGW-B must have some mechanism for authenticating USER
independently of SGW-A.
If access is permitted for anyone within corporation A, then machine
authentication will suffice. However, this is highly unlikely. A
slightly more likely situation might be one in which access is
permitted to anyone within a particular organizational unit in
corporation A. This case is very similar the single user access case
discussed above, and essentially has the same requirements in terms
of the mechanism required for SGW-A, although machine authentication
might suffice if the organizational unit which is permitted access
has a sufficient level of physical security. Again, this requires
that corporation B trust corporation A in this regard.
To summarize, the following are the authentication requirements for
the IRAS and IRAC:
IRAS
----
o machine authentication MUST be provided.
IRAC
----
o support for either user or machine authentication MUST be
provided
o support for a combination of user and machine authentication
SHOULD be provided
o if user authentication is used, periodic renewal SHOULD occur
3.2.2 Device Configuration Requirements
It is possible that corporation B would want to assign a virtual
address to USER for the duration of the connection. The only way
this could be accomplished would be if USER were a tunnel endpoint
(e.g., in cases (1) and (3)). It is not clear what benefits, if any,
this would offer.
To summarize, the following are the device configuration requirements
for the IRAC:
o support for a virtual address MAY be provided
o if VIP support is provided, support for all device-related
parameters listed in section 2.2 above SHOULD be supported
Kelly & Ramamoorthi Informational [Page 20]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
o support for address assignment based upon authenticated
identity SHOULD be supported
o if authenticated address assignment is not supported, an
identity-based dynamic policy update mechanism such as is
described in [ARCH] MUST be supported.
3.2.3 Policy Configuration Requirements
Any of the cases discussed above would present some static policy
configuration requirements. Case (1) would require that SGW-A and
SGW-B permit IPsec traffic to pass between USER and S1/S2. Case (3)
would have similar requirements, except that the IPsec traffic would
be between USER and SGW-B. Case (2) would require that the
appropriate transit traffic be secured between USER and S1/S2.
None of these cases require dynamic policy configuration.
3.2.4 Auditing Requirements
For cases (1) and (3), session start/end times must be collected.
Reliable derivation of session end time requires that the IRAC
somehow periodically signify that the connection remains active.
This is implied if the IRAS receives data from the IRAC over the
connection, but in cases where no data is sent for some period of
time, a signaling mechanism is required by which the IRAC indicates
that the connection remains in use.
For case (2), the type(s) of required auditing data would depend upon
whether traffic from multiple users were aggregated within a single
tunnel or not. If so, the notion of individual connection start/stop
times would be lost. If such measures are desired, this requires
that per-user tunnels be set up between SGW-A and SGW-B, and that
some sort of timeout interval be used to cause tunnel teardown when
traffic does not flow for some interval of time.
3.2.5 Intermediary Traversal Requirements
If the address assigned by the host network to the IRAC system is
globally routable, and no intermediate devices between the IRAC and
the IRAS perform NAPT operations on the data stream, then there are
no additional requirements in this regard. If NAPT operations are
performed on the data stream, some mechanism must be provided in
order to render these modifications transparent to the IPsec
implementation.
If a firewall situated at the edge of the host network cannot be
configured to pass protocols in the IPsec suite, then some mechanism
must be provided which converts the data stream to one which the
Kelly & Ramamoorthi Informational [Page 21]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
firewall may be configured to pass. If the firewall can be
configured to pass IPsec protocols, then this must be accomplished
prior to connection establishment.
3.3 Extranet Laptop to Home Corporate Net
The use of a laptop while visiting another corporation presents
another increasingly common extranet scenario. In this case, a user
works temporarily within another corporation, perhaps as part of a
service agreement of some sort. The user brings along a CORP-A
laptop which is assigned a CORP-B address either statically or
dynamically, and the user wishes to securely access resources on
CORP-A's network using this laptop. This scenario has the following
appearance:
CORP A CORP B
| |
+----+ | | +--------+
|POP |---| |--| CORP-A |
+----+ | +------++ ++------+ | | laptop |
|---|SGW/FW||===Internet===||SGW/FW|---| +--------+
| +------++ ++------+ |
+----+ | SGW-A SGW-B |
|FTP |---| |
+----+ | |
This is very similar to the telecommuter scenario, but it differs in
several important ways. First, in this case there is often a SGW
and/or firewall at the edge of CORP-B's site. Second, there may be a
significantly increased risk that a long-lived connection could
become accessible to someone other than the intended user.
3.3.1 Authentication Requirements
In most cases, the only acceptable connections from CORP-A's
perspective are between the laptop and either SGW-A or the CORP-A
servers the laptop wishes to access. Most of the considerations
applied to the telecommuter also apply here, and user-level
authentication is required to provide assurance that the user who
initiated the connection is still the active user. As an added
precaution, a combination of user-level and machine-level
authentication may be warranted in some cases. Further, in either
case this authentication should be renewed frequently.
Kelly & Ramamoorthi Informational [Page 22]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
To summarize, the following are the authentication requirements for
the IRAS and IRAC:
IRAS
----
o machine authentication MUST be provided.
IRAC
----
o support for machine authentication SHOULD be provided
o support for user authentication MUST be provided
o support for a combination of user and machine authentication
SHOULD be provided
o periodic renewal of user authentication MUST occur
3.3.2 Device Configuration Requirements
The device configuration requirements in this scenario are the same
as for the telecommuter, i.e., the laptop may be assigned a virtual
presence on the corporate network, and if so, will require full
infrastructure configuration.
To summarize, the following are the device configuration requirements
for the IRAC:
o support for a virtual address MAY be provided
o if VIP support is provided, support for all device-related
parameters listed in section 2.2 above SHOULD be supported
o support for address assignment based upon authenticated
identity SHOULD be supported
o if authenticated address assignment is not supported, an
identity-based dynamic policy update mechanism such as is
described in [ARCH] MUST be supported.
3.3.3 Policy Configuration Requirements
The policy configuration requirements in this scenario differ from
those of the telecommuter, in that the laptop cannot be assigned a
policy which requires all traffic to be forwarded to CORP-A via the
tunnel. This is due to the fact that the laptop has a CORP-B
address, and as such, may have traffic destined to CORP-B. If this
traffic were tunneled to CORP-A, there might be no return path to
CORP-B except via the laptop. On the other hand, Internet-bound
traffic could be subjected to this restriction if desired, and/or all
traffic other than that between CORP-A and the laptop could be
blocked for the duration of the connection.
Kelly & Ramamoorthi Informational [Page 23]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
IRAC
----
o support for IRAS update of IRAC policy MAY be provided.
o if IRAS update of IRAC policy is not supported, IRAC MAY
support IRAS directives to "block-all" for non-tunneled
traffic.
o IRAC SHOULD provide ability to configure for "tunnel-all"
and/or "block-all" for traffic not destined for the remote
network to which IPsec remote access is being provided.
3.3.4 Auditing Requirements
The auditing requirements in this scenario are the same as for the
telecommuter scenario. Session start/end times must be collected.
Reliable derivation of session end time requires that the IRAC
somehow periodically signify that the connection remains active.
This is implied if the IRAS receives data from the IRAC over the
connection, but in cases where no data is sent for some period of
time, a signaling mechanism is required by which the IRAC indicates
that the connection remains in use.
3.3.5 Intermediary Traversal Requirements
If the address assigned by the host network to the IRAC system is
globally routable, and no intermediate devices between the IRAC and
the IRAS perform NAPT operations on the data stream, then there are
no additional requirements in this regard. If NAPT operations are
performed on the data stream, some mechanism must be provided in
order to render these modifications transparent to the IPsec
implementation.
If a firewall situated at the edge of the host network cannot be
configured to pass protocols in the IPsec suite, then some mechanism
must be provided which converts the data stream to one which the
firewall may be configured to pass. If the firewall can be
configured to pass IPsec protocols, then this must be accomplished
prior to connection establishment.
Kelly & Ramamoorthi Informational [Page 24]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
3.4 Extranet Desktop to Home Corporate Net
This is very similar to the extranet laptop scenario discussed above,
except that a higher degree of trust for CORP-B is required by
CORP-A. This scenario has the following appearance:
CORP A CORP B
| |
+----+ | | +--------+
|POP |---| |--| CORP-B |
+----+ | +------++ ++------+ | |desktop |
|---|SGW/FW||===Internet===||SGW/FW|---| +--------+
| +------++ ++------+ |
+----+ | SGW-A SGW-B |
|FTP |---| |
+----+ | |
3.4.1 Authentication Requirements
The authentication requirements for the desktop extranet scenario are
very similar to those of the extranet laptop scenario discussed
above. The primary difference lies in the authentication type which
may be used, i.e., in the laptop case, CORP-A can derive some
assurance that the connection is coming from one of CORP-A's systems
if a securely stored machine credential is stored on and used by on
the laptop. In the desktop case this is not possible, since CORP-A
does not own the IRAC system.
To summarize, the following are the authentication requirements for
the IRAS and IRAC:
IRAS
----
o machine authentication MUST be provided.
IRAC
----
o support for machine authentication MAY be provided
o support for user authentication MUST be provided
o support for a combination of user and machine authentication
MAY be provided
o periodic renewal of user authentication MUST occur
Kelly & Ramamoorthi Informational [Page 25]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
3.4.2 Device Configuration Requirements
The device configuration requirements in this scenario are the same
as for the laptop extranet scenario, i.e., the desktop system may be
assigned a virtual presence on the corporate network, and if so, will
require full infrastructure configuration. However, this seems less
likely than in the laptop scenario, given CORP-A's lack of control
over the software configuration of CORP-B's desktop system.
3.4.3 Policy Configuration Requirements
The policy configuration requirements are quite similar to those of
the extranet laptop, except that in this scenario there is even less
control over CORP-B's desktop than there would be over the laptop.
This means it may not be possible to restrict traffic in any way at
the desktop system.
3.4.4 Auditing Requirements
The auditing requirements in this scenario are the same as for the
telecommuter scenario. Session start/end times must be collected.
Reliable derivation of session end time requires that the IRAC
somehow periodically signify that the connection remains active.
This is implied if the IRAS receives data from the IRAC over the
connection, but in cases where no data is sent for some period of
time, a signaling mechanism is required by which the IRAC indicates
that the connection remains in use.
3.4.5 Intermediary Traversal Requirements
If the address assigned by the host network to the IRAC system is
globally routable, and no intermediate devices between the IRAC and
the IRAS perform NAPT operations on the data stream, then there are
no additional requirements in this regard. If NAPT operations are
performed on the data stream, some mechanism must be provided in
order to render these modifications transparent to the IPsec
implementation.
If a firewall situated at the edge of the host network cannot be
configured to pass protocols in the IPsec suite, then some mechanism
must be provided which converts the data stream to one which the
firewall may be configured to pass. If the firewall can be
configured to pass IPsec protocols, then this must be accomplished
prior to connection establishment.
Kelly & Ramamoorthi Informational [Page 26]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
3.5 Public System to Target Network
This scenario entails a traveling user connecting to the target
network using a public system owned by someone else. A commonly
cited example is an airport kiosk. This looks very similar to the
extranet desktop scenario, except that in the extranet scenario,
CORP-A might have a trust relationship with CORP-B, whereas in this
scenario, CORP-A may not trust a publicly accessible system. Note
that a trust relationship between CORP-A and the owner of the public
system may exist, but in many cases will not.
3.5.1 Authentication Requirements
There are two variations to this scenario. In the first, no trust
relationship exists between the target network and the borrowed
system. In the second, some trust relationship does exist. In the
case where no trust relationship exists, machine authentication is
out of the question, as it is meaningless in this context. Further,
since such a system could easily capture a passphrase, use of a
static passphrase from such a system would seem to be ill-advised.
If a one-time passphrase were used, this would mitigate the risk of
passphrase capture by the public system. On the other hand, if it is
acknowledged that such capture is a real threat (i.e., the system
itself is malicious), then it must also be recognized that any data
transmitted and received via the resulting session would not be
confidential or reliable with respect to this malicious system, and
that the system could not be trusted to have actually disconnected
when the user walks away. This suggests that accessing non-trivial
information from such a system would be imprudent.
Another possible user authentication option would be a smartcard.
However, many smartcards require a pin or passphrase to "unlock"
them, which requires some level of trust in the kiosk to not record
the pin. Hence, this approach suffers from drawbacks similar to
those of the static passphrase in this regard. The primary
difference would be that the pin/passphrase could not be used alone
for access in the smartcard case.
In cases where a trust relationship with the owner of the public
system exists, the trust level would modulate the risk levels
discussed above. For example, if a sufficient level of trust for the
system owner exists, use of a static passphrase might present no more
risk than if this were permitted from a system owned by the accessed
target. However, the primary benefit of such a trust relationship
would be derived from the ability to authenticate the machine from
Kelly & Ramamoorthi Informational [Page 27]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
which the user is attempting access. For example, a security policy
requiring that remote access only be permitted with combined
user/machine authentication might be effected, with further control
regarding which machines were allowed.
An additional issue to be dealt with in either case pertains to
verification of the identity of the IRAS. If the IRAC were to be
misdirected somehow, a man in the middle attack could be effected,
with the obtained password being then used for malicious access to
the true IRAS. Note that even a one-time password mechanism offers
little protection in this case. In order to avert such an attack,
the IRAC must possess some certifiable or secret knowledge of the
IRAS prior to attempting to connect. Note that in the case where no
trust relationship exists, this is not possible.
To summarize, the following are the authentication requirements for
the IRAS and IRAC:
IRAS
----
o machine authentication MUST be provided.
IRAC
----
o in cases where no trust relationship exists between the
accessed network and the system owner, sensitive data SHOULD
NOT be transmitted in either direction.
o in cases where a trust relationship exists between the accessed
network and the system owner, machine authentication SHOULD be
supported.
o in cases where a trust relationship exists between the accessed
network and the system owner, a static passphrase MAY be used
in conjunction with machine-level authentication of the IRAC
system.
o frequent renewal of user authentication MUST occur
3.5.2 Device Configuration Requirements
None.
3.5.3 Policy Configuration Requirements
None.
Kelly & Ramamoorthi Informational [Page 28]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
3.5.4 Auditing Requirements
The auditing requirements in this scenario are the same as for the
telecommuter scenario. Session start/end times must be collected.
Reliable derivation of session end time requires that the IRAC
somehow periodically signify that the connection remains active.
This is implied if the IRAS receives data from the IRAC over the
connection, but in cases where no data is sent for some period of
time, a signaling mechanism is required by which the IRAC indicates
that the connection remains in use.
3.5.5 Intermediary Traversal Requirements
If the address of the IRAC system is globally routable, and no
intermediate devices between the IRAC and the IRAS perform NAPT
operations on the data stream, then there are no additional
requirements in this regard. If NAPT operations are performed on the
data stream, some mechanism must be provided in order to render these
modifications transparent to the IPsec implementation.
4. Scenario Commonalities
As we examine the various remote access scenarios, a general set of
common requirements emerge. Following is a summary:
o Support for user authentication is required in almost all
scenarios
o Machine authentication for the IRAS is required in all scenarios
o A mechanism for providing device configuration for the IRAC is
required in most scenarios. Such a mechanism must be extensible.
o Machine authentication for IRAC is generally only useful when
combined with user authentication. Combined user and machine
authentication is useful in some scenarios.
o Dynamic IRAC policy configuration is useful in several scenarios.
o Most scenarios require auditing for session start/stop times.
o An intermediary traversal mechanism may be required in any of the
scenarios.
Kelly & Ramamoorthi Informational [Page 29]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
5. Security Considerations
The topic of this document is secure remote access. Security
considerations are discussed throughout the document.
6. References
[ARCH] Kent, S. and R. Atkinson, "Security Architecture for the
Internet Protocol", RFC 2401, November 1998.
[KEYWORDS] Bradner, S., "Key Words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RADIUS] Rigney, C., Rubens, A., Simpson, W. and S. Willens,
"Remote Authentication Dial In User Service (RADIUS)",
RFC 2865, June 2000.
[IKE] Harkins, D. and D. Carrel, "The Internet Key Exchange
(IKE)", RFC 2409, November 1998.
7. Acknowledgements
The editors would like to acknowledge the many helpful comments of
Sara Bitan, Steve Kent, Mark Townsley, Bernard Aboba, Mike Horn, and
other members of the ipsra working group who have made helpful
comments on this work.
8. Editors' Addresses
Scott Kelly
Airespace
110 Nortech Pkwy
San Jose CA 95134 USA
Phone: +1 (408) 941-0500
EMail: scott@hyperthought.com
Sankar Ramamoorthi
Juniper Networks
1194 North Mathilda Ave
Sunnyvale CA 94089-1206 USA
Phone: +1 (408) 936-2630
EMail: sankarr@juniper.net
Kelly & Ramamoorthi Informational [Page 30]
^L
RFC 3457 IPsec Remote Access Scenarios January 2003
9. Full Copyright Statement
Copyright (C) The Internet Society (2003). All Rights Reserved.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it
or assist in its implementation may be prepared, copied, published
and distributed, in whole or in part, without restriction of any
kind, provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of
developing Internet standards in which case the procedures for
copyrights defined in the Internet Standards process must be
followed, or as required to translate it into languages other than
English.
The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns.
This document and the information contained herein is provided on an
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Acknowledgement
Funding for the RFC Editor function is currently provided by the
Internet Society.
Kelly & Ramamoorthi Informational [Page 31]
^L
|