Information About GM Removal and Policy Trigger
GET VPN Software Versioning
GET VPN software versions are of the form
major-version.minor-version.mini-version
where
-
major-version defines compatibility for all GET VPN devices.
-
minor-version defines compatibility for key server (KS)-to-KS (cooperative key server) associations and for GM-to-GM interoperability.
-
mini-version tracks feature changes that have no compatibility impact.
For example, the base version (for all prior GET VPN features) is 1.0.1. Also, for example, the version that contains the GM removal feature and the policy replacement feature is 1.0.2, which means that these features are fully backward compatible with the base version (despite the introduction of behavior in these features for triggered rekeys).
GMs send the GET VPN software version to the KS in the vendor-ID payload during Internet Key Exchange ( IKE) phase 1 negotiation (which is defined in RFC 2408, Internet Security Association and Key Management Protocol [ISAKMP]). KSs send the software version to other cooperative KSs in the version field of the cooperative KS announcement (ANN) messages. Cooperative KSs also synchronize their lists of versions that each GM is using.
The GM removal feature and the policy replacement feature each provide a command that you run on the KS (or primary KS) to find devices in the group that do not support that feature.
GM Removal
Without the GM removal and policy replacement features, you would need to complete the following steps to remove unwanted GMs from a group:
-
Revoke the phase 1 credential (for example, the preshared key or one or more PKI certificates).
-
Clear the traffic encryption key (TEK) and key encryption key (KEK) database on the KS.
-
Clear the TEK and KEK database on each GM individually and force each GM to re-register.
The third step is time-consuming when a GET VPN group serves thousands of GMs. Also, clearing the entire group in a production network might cause a network disruption. The GET VPN GM Removal and Policy Trigger feature automates this process by introducing a command that you enter on the KS (or primary KS) to create a new set of TEK and KEK keys and propagate them to the GMs.
GM Removal Compatibility with Other GET VPN Software Versions
You should use the GET VPN GM Removal and Policy Trigger feature only after all devices in the GET VPN network are upgraded to GET VPN software versions that support this feature. Otherwise, secondary KSs or GMs running older software will ignore the GM removal message and continue to encrypt and decrypt traffic using the old SAs. This behavior causes network traffic disruption.
This feature provides a command that you use on the KS (or primary KS) to check whether all devices in the network are running versions that support GM removal. When the primary KS tries to remove GMs in a network containing devices that do not support GM removal, a warning message appears. For more information, see the “Ensuring That GMs Are Running Software Versions That Support GM Removal” section.
GM Removal with Transient IPsec SAs
The GET VPN GM Removal and Policy Trigger feature provides a command that you use on the KS (or primary KS) to trigger GM removal with transient IPsec SAs. This behavior shortens key lifetimes for all GMs and causes them to re-register before keys expire. During GM removal, no network disruption is expected, because traffic continues to be encrypted and decrypted using the transient IPsec SA until its lifetime expires. For more information, see the “Removing GMs with Transient IPsec SAs” section.
GM Removal with Immediate IPsec SA Deletion
The GET VPN GM Removal and Policy Trigger feature provides an optional keyword that you can use on the KS (or primary KS) to force GMs to delete old TEKs and KEKs immediately (without using transient SAs) and re-register. However, this behavior can cause a disruption to the data plane, so you should use this method only for important security reasons. For more information, see the “Removing GMs and Deleting IPsec SAs Immediately” section.
Policy Replacement and Rekey Triggering
The GET VPN GM Removal and Policy Trigger feature provides a new rekey triggering method to remove obsolete SAs and install new SAs.
Inconsistencies Regarding Which TEK and KEK Policy Changes Will Trigger Rekeys
Without this feature, there are inconsistencies regarding which TEK and KEK policy changes will trigger rekeys:
-
Multiple rekeys could be sent during the course of security policy updates.
-
Some policy changes (for example, transform set, profile, lifetime, and anti-replay) will install new SAs on GMs; however, the SAs from the existing policies remain active until their lifetimes expire.
-
Some policy changes (for example, a TEK’s access control entry/access control list (ACE/ACL) changes) will install new SAs on GMs and take effect immediately. However, the obsolete SAs are kept in each GM’s database (and can be displayed using the show crypto ipsec sa command until their lifetimes expire).
For example, if the KS changes the policy from Data Encryption Standard (DES) to Advanced Encryption Standard (AES), when the GM receives this triggered rekey, it installs the new SAs (for example, for AES) and shortens the lifetimes of the old SAs (for example, for DES). The GM continues to encrypt and decrypt traffic using the old SAs until their shortened lifetimes expire.
Following is the formula to calculate the shortened lifetime:
TEK_SLT = MIN(TEK_RLT, MAX(90s, MIN(5%(TEK_CLT), 3600s)))
where
-
TEK_SLT is the TEK shortened lifetime
-
TEK_RLT is the TEK remaining lifetime
-
TEK_CLT is the TEK configured lifetime
The following table summarizes the inconsistencies regarding rekeys.
Policy Changes |
Rekey Sent? |
Rekey Behavior After Policy Changes |
---|---|---|
TEK: SA lifetime |
No |
The old SA remains active until its lifetime expires. The new lifetime will be effective after the next scheduled rekey. Even if you enter the clear crypto sa command, it will re-register and download the old SA with the old lifetime again. |
TEK: IPSEC transform set |
Yes |
The SA of the old transform set remains active until its lifetime expires. |
TEK: IPSEC profile |
Yes |
The SA of the old profile remains active until its lifetime expires. |
TEK: Matching ACL |
Yes |
Outbound packet classification immediately uses the ACL. But the old SAs remain in the SA database (you can view them by using the show crypto ipsec sa command). |
TEK: Enable replay counter |
Yes |
But the old SA without counter replay remains active until its lifetime expires. |
TEK: Change replay counter value |
No |
The SA with a new replay counter is sent out in the next scheduled rekey. |
TEK: Disable replay counter |
Yes |
But the old SA with counter replay enabled remains active until its lifetime expires. |
TEK: Enable TBAR |
Yes |
But the old SA with time-based anti-replay (TBAR) disabled remains active until its lifetime expires. |
TEK: Change TBAR window |
No |
The SA with a new TBAR window will be sent out in the next scheduled rekey. |
TEK: Disable TBAR |
Yes |
But the old SA with TBAR enabled remains active until its lifetime expires. |
TEK: Enable receive-only |
Yes |
Receive-only mode is activated right after the rekey. |
TEK: Disable receive-only |
Yes |
Receive-only mode is deactivated right after the rekey. |
KEK: SA lifetime behavior |
No |
The change is applied with the next rekey. |
KEK: Change authentication key |
Yes |
The change is applied immediately. |
KEK: Change crypto algorithm |
Yes |
The change is applied immediately. |
This feature solves these problems by ensuring consistency. With this feature, GET VPN policy changes alone will no longer trigger a rekey. When you change the policy (and exit from global configuration mode), a syslog message appears on the primary KS indicating that the policy has changed and a rekey is needed. This feature provides a new command that you then enter on the KS (or primary KS) to send a rekey (that is based on the latest security policy in the running configuration).
This feature also provides an extra keyword to the new command to force a GM receiving the rekey to remove the old TEKs and KEK immediately and install the new TEKs and KEK. Therefore, the new policy takes effect immediately without waiting for old policy SAs to expire. (However, using this keyword could cause a temporary traffic discontinuity, because all GMs might not receive the rekey message at the same time.)
Policy Replacement and Rekey Triggering Compatibility with Other GET VPN Software Versions
You should use rekey triggering only after all devices in the GET VPN network are upgraded to GET VPN software versions that support this feature. For GMs running older versions that do not yet support the crypto gdoi ks command, the primary KS uses the software versioning feature to detect those versions and only triggers a rekey without sending instruction for policy replacement. Therefore, when a GM receives the rekey, it installs the new SAs but does not shorten the lifetimes of the old SAs. (This behavior is the same as the prior rekey method and ensures backward compatibility for devices that cannot support policy replacement.)
This feature provides a command that you use on the KS (or primary KS) to check whether all the devices in the network are running versions that support policy replacement. For more information, see the “Ensuring That GMs Are Running Software Versions That Support Policy Replacement” section.