Re: [Hipsec] NULL encryption mode in RFC 5202-bis

Miika Komu <mkomu@cs.hut.fi> Tue, 08 July 2014 10:04 UTC

Return-Path: <mkomu@cs.hut.fi>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 25EC11B27E5; Tue, 8 Jul 2014 03:04:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.851
X-Spam-Level:
X-Spam-Status: No, score=-4.851 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.651] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5HJtwNEsK5rQ; Tue, 8 Jul 2014 03:04:41 -0700 (PDT)
Received: from mail.cs.hut.fi (mail.cs.hut.fi [130.233.192.7]) by ietfa.amsl.com (Postfix) with ESMTP id ADAF41B27DE; Tue, 8 Jul 2014 03:04:41 -0700 (PDT)
Received: from [127.0.0.1] (hutcs.cs.hut.fi [130.233.192.10]) by mail.cs.hut.fi (Postfix) with ESMTP id 1BF35308DEE; Tue, 8 Jul 2014 13:04:38 +0300 (EEST)
Message-ID: <53BBC235.6030801@cs.hut.fi>
Date: Tue, 08 Jul 2014 13:04:37 +0300
From: Miika Komu <mkomu@cs.hut.fi>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Tom Henderson <tomh@tomh.org>, hipsec@ietf.org, saag@ietf.org
References: <53BB798A.3080101@tomh.org>
In-Reply-To: <53BB798A.3080101@tomh.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/hipsec/AhUowqq518Pvi1TP6KdNsKUTFhQ
Cc: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Subject: Re: [Hipsec] NULL encryption mode in RFC 5202-bis
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Jul 2014 10:04:44 -0000

Hi,

On 07/08/2014 07:54 AM, Tom Henderson wrote:
> Hi all,
>
> Apologies for cross-posting, but Stephen Farrell raised a DISCUSS
> (seconded by Kathleen Moriarty) in the IESG evaluation of RFC 5202-bis:
>    Using the Encapsulating Security Payload (ESP) Transport Format with
> the Host Identity Protocol (HIP).  Stephen asked me to raise this
> question for discussion on both the HIP and SAAG lists.
>
> Stephen's discuss questions the specification of "MUST to implement" for
> the NULL encryption option of the ESP_TRANSFORM parameter:
>
> http://tools.ietf.org/html/draft-ietf-hip-rfc5202-bis-05#section-5.1.2
>
> Stephen asks why is this a MUST to implement?  The history behind this
> that I'm aware of is that since HIP does not have an AH, only ESP, the
> ESP with NULL encryption mode can provide authentication.  It was also
> stated in previous drafts that this mode supports debugging.
>
> Null encryption was also specified as a MUST to implement in RFC5202 and
> dates back to earlier versions of the HIP base draft (to 2003:
> http://tools.ietf.org/html/draft-moskowitz-hip-06#section-11.3).

maybe we should keep it as it is for easier, incremental 
interoperability testing. The same issue was discussed earlier in this 
thread:

http://www.ietf.org/mail-archive/web/hipsec/current/msg01779.html

If you think this is a big problem, I'd suggest replacing NULL with 
suite id 9.