Re: [Hipsec] [saag] NULL encryption mode in RFC 5202-bis

James Cloos <cloos@jhcloos.com> Tue, 08 July 2014 15:16 UTC

Return-Path: <cloos@jhcloos.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CCA3F1B2B0B; Tue, 8 Jul 2014 08:16:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.652
X-Spam-Level:
X-Spam-Status: No, score=-2.652 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RP_MATCHES_RCVD=-0.651, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jdgropSepPlP; Tue, 8 Jul 2014 08:16:07 -0700 (PDT)
Received: from ore.jhcloos.com (ore.jhcloos.com [198.147.23.85]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B26881B2811; Tue, 8 Jul 2014 08:16:07 -0700 (PDT)
Received: by ore.jhcloos.com (Postfix, from userid 10) id C94701E512; Tue, 8 Jul 2014 15:16:06 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jhcloos.com; s=ore14; t=1404832566; bh=gaX/6Wjya3yTpcfa0/Am3DODFs+M4n71RdtW18i3KTM=; h=From:To:Cc:Subject:In-Reply-To:References:Date:From; b=lwDVx2ecIMWDQxjFeXiKw7Bb0cSfDmN5vnvMuw97C1us75Jz9g1iLWs9hRtmR8LQY IaJWV1D6HgHh8mGMqPA8mkz852qgpQCdH9h8qSjHg54/fTRShDCb4Vx4oDyvjpTn+G CHt9kYLMgEdTjXhMf7LYXlYc+Cz5jmvF9IgolQV4=
Received: by carbon.jhcloos.org (Postfix, from userid 500) id 5D33660022; Tue, 8 Jul 2014 15:06:03 +0000 (UTC)
From: James Cloos <cloos@jhcloos.com>
To: Tom Henderson <tomh@tomh.org>
In-Reply-To: <53BB798A.3080101@tomh.org> (Tom Henderson's message of "Mon, 07 Jul 2014 21:54:34 -0700")
References: <53BB798A.3080101@tomh.org>
User-Agent: Gnus/5.130012 (Ma Gnus v0.12) Emacs/24.4.50 (gnu/linux)
Face: iVBORw0KGgoAAAANSUhEUgAAABAAAAAQAgMAAABinRfyAAAACVBMVEX///8ZGXBQKKnCrDQ3 AAAAJElEQVQImWNgQAAXzwQg4SKASgAlXIEEiwsSIYBEcLaAtMEAADJnB+kKcKioAAAAAElFTkSu QmCC
Copyright: Copyright 2014 James Cloos
OpenPGP: 0x997A9F17ED7DAEA6; url=https://jhcloos.com/public_key/0x997A9F17ED7DAEA6.asc
OpenPGP-Fingerprint: E9E9 F828 61A4 6EA9 0F2B 63E7 997A 9F17 ED7D AEA6
Date: Tue, 08 Jul 2014 11:06:03 -0400
Message-ID: <m3lhs3dh5w.fsf@carbon.jhcloos.org>
Lines: 15
MIME-Version: 1.0
Content-Type: text/plain
X-Hashcash: 1:30:140708:tomh@tomh.org::T0MNsVncLJB9cP2y:000cwtka
X-Hashcash: 1:30:140708:hipsec@ietf.org::DfIEo4o9SvSteygn:07AmQT
X-Hashcash: 1:30:140708:saag@ietf.org::Ib/LELvpe1kI9sTa:000tqHve
Archived-At: http://mailarchive.ietf.org/arch/msg/hipsec/c2fOxLqM8mzPfaq_zsk3PC4_iGk
X-Mailman-Approved-At: Sun, 20 Jul 2014 05:30:24 -0700
Cc: hipsec@ietf.org, saag@ietf.org
Subject: Re: [Hipsec] [saag] NULL encryption mode in RFC 5202-bis
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Jul 2014 15:16:09 -0000

>>>>> "TH" == Tom Henderson <tomh@tomh.org> writes:

TH> Stephen's discuss questions the specification of "MUST to implement"
TH> for the NULL encryption option of the ESP_TRANSFORM parameter:

If those doing IP over Amateur Radio are a use case, they require NULL.

Encryption is illegal for most of them (I hear Australia allows it in
some cases; AFAIK no other country does) but authentication has value.

And that restriction is enforced.

-JimC
-- 
James Cloos <cloos@jhcloos.com>         OpenPGP: 0x997A9F17ED7DAEA6