Re: [Gen-art] Gen-ART review of draft-ietf-behave-64-analysis-06
Russ Housley <housley@vigilsec.com> Tue, 28 February 2012 20:43 UTC
Return-Path: <housley@vigilsec.com>
X-Original-To: gen-art@ietfa.amsl.com
Delivered-To: gen-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 729DB21F86D0 for <gen-art@ietfa.amsl.com>; Tue, 28 Feb 2012 12:43:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.546
X-Spam-Level:
X-Spam-Status: No, score=-102.546 tagged_above=-999 required=5 tests=[AWL=0.053, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FSWxm+YcPRar for <gen-art@ietfa.amsl.com>; Tue, 28 Feb 2012 12:43:54 -0800 (PST)
Received: from odin.smetech.net (mail.smetech.net [208.254.26.82]) by ietfa.amsl.com (Postfix) with ESMTP id 7C63B21F86C7 for <gen-art@ietf.org>; Tue, 28 Feb 2012 12:43:54 -0800 (PST)
Received: from localhost (unknown [208.254.26.81]) by odin.smetech.net (Postfix) with ESMTP id 509F99A472A; Tue, 28 Feb 2012 15:44:10 -0500 (EST)
X-Virus-Scanned: amavisd-new at smetech.net
Received: from odin.smetech.net ([208.254.26.82]) by localhost (ronin.smetech.net [208.254.26.81]) (amavisd-new, port 10024) with ESMTP id QiKR35SNhQJy; Tue, 28 Feb 2012 15:43:48 -0500 (EST)
Received: from [192.168.2.104] (pool-96-241-165-215.washdc.fios.verizon.net [96.241.165.215]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by odin.smetech.net (Postfix) with ESMTP id D7C169A4727; Tue, 28 Feb 2012 15:44:09 -0500 (EST)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset="us-ascii"
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <7C4DFCE962635144B8FAE8CA11D0BF1E05AEC8C63C@MX14A.corp.emc.com>
Date: Tue, 28 Feb 2012 15:43:53 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <D2B84A7F-BF4D-4E97-B3E8-EDAC64F76836@vigilsec.com>
References: <7C4DFCE962635144B8FAE8CA11D0BF1E05AEC8C63C@MX14A.corp.emc.com>
To: david.black@emc.com
X-Mailer: Apple Mail (2.1084)
Cc: tasaxena@cisco.com, mohamed.boucadair@orange.com, gen-art@ietf.org, rpenno@juniper.net, ssenthil@cisco.com, dthaler@microsoft.com, dwing@cisco.com, Martin.Stiemerling@neclab.eu, ietfdbh@comcast.net
Subject: Re: [Gen-art] Gen-ART review of draft-ietf-behave-64-analysis-06
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gen-art>, <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/gen-art>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Feb 2012 20:43:56 -0000
David: Has an errata been entered against RFC 3948? On Feb 28, 2012, at 11:01 AM, <david.black@emc.com> <david.black@emc.com> wrote: > I have been selected as the General Area Review Team (Gen-ART) reviewer > for this draft (for background on Gen-ART, please see > http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html) > > Please wait for direction from your document shepherd or > AD before posting a new version of the draft. > > Document: draft-ietf-behave-64-analysis-06 > Reviewer: David L. Black > Review Date: February 28, 2012 > IETF LC End Date: February 20, 2012 > IESG Telechat Date: March 1, 2012 > > Summary: > > This draft is on the right track but has open issues, described in the review. > > Comments: > > This draft summarizes the improvements of stateful 64 techniques over the now-historic > NAT-PT techniques for communication between IPv4 and IPv6 networks. The draft does a > nice job of summarizing the current situation in a fashion that avoids the reader > having to go through the plethora of details in the cited references. The draft is > clearly written and reads well. > > There is one open issue that's almost a nit - unfortunately, the IPsec discussion in > item 6 of Section 3.2 is wrong, even though it was copied from RFC 4966 (FWIW, it's > wrong there, also): > > 6. Unless UDP encapsulation is used for IPsec [RFC3948], traffic > using IPsec AH (Authentication Header), in transport and tunnel > mode, and IPsec ESP (Encapsulating Security Payload), in > transport mode, is unable to be carried through NAT-PT without > terminating the security associations on the NAT-PT, due to their > usage of cryptographic integrity protection (Section 4.5 of > [RFC4966]). > > There are four problems with that explanation: > > (1) AH cannot be UDP-encapsulated. RFC 3948 says: > > Because the protection of the outer IP addresses in IPsec AH is > inherently incompatible with NAT, the IPsec AH was left out of the > scope of this protocol specification. > > (2) The reasons for use of UDP encapsulation with ESP do not include ESP's > "usage of cryptographic integrity protection." because ESP's cryptographic > integrity protection does not include any IP header fields. The actual reasons > are considerably more subtle and involved (e.g., traffic selector issues and > NAT implementations that did not work correctly with IKE), see RFC 3715. > > (3) Nit: The correct RFC 4966 reference is Section 2.1, not 4.5. > > (4) A number of additional references are needed, starting with RFC 3715. > > Here's an attempt to propose a text change: > > OLD > 6. Unless UDP encapsulation is used for IPsec [RFC3948], traffic > using IPsec AH (Authentication Header), in transport and tunnel > mode, and IPsec ESP (Encapsulating Security Payload), in > transport mode, is unable to be carried through NAT-PT without > terminating the security associations on the NAT-PT, due to their > usage of cryptographic integrity protection (Section 4.5 of > [RFC4966]). > NEW > 6. IPsec traffic using AH (Authentication Header) [RFC4302] in > both transport and tunnel modes cannot be carried through NAT-PT > without terminating the security associations on the NAT-PT, due > to the inclusion of IP header fields in the scope of AH's cryptographic > integrity protection [RFC3715] (Section 2.1 of [RFC4966]). In > addition, IPsec traffic using ESP (Encapsulating Security Payload) > [RFC4303] in transport mode generally uses UDP encapsulation [RFC3948] > for NAT traversal (including NAT-PT traversal) in order to avoid the > problems described in [RFC3715] (Section 2.1 of [RFC 4966]). > END > > The Security Area should review the above proposed text change. > > idnits 2.12.13 noted that RFC 2766 was obsoleted by RFC 4966 - this is > fine, as RFC 2766 does need to be cited. > > Thanks, > --David > ---------------------------------------------------- > David L. Black, Distinguished Engineer > EMC Corporation, 176 South St., Hopkinton, MA 01748 > +1 (508) 293-7953 FAX: +1 (508) 293-7786 > david.black@emc.com Mobile: +1 (978) 394-7754 > ---------------------------------------------------- > > _______________________________________________ > Gen-art mailing list > Gen-art@ietf.org > https://www.ietf.org/mailman/listinfo/gen-art
- [Gen-art] Gen-ART review of draft-ietf-behave-64-… david.black
- Re: [Gen-art] Gen-ART review of draft-ietf-behave… Russ Housley
- Re: [Gen-art] Gen-ART review of draft-ietf-behave… david.black
- Re: [Gen-art] Gen-ART review of draft-ietf-behave… mohamed.boucadair
- Re: [Gen-art] Gen-ART review of draft-ietf-behave… david.black