Re: [IPsec] Diet-ESP

Hannes Tschofenig <hannes.tschofenig@gmx.net> Wed, 18 February 2015 08:26 UTC

Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4DF5D1A911D; Wed, 18 Feb 2015 00:26:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mop1teDHsNfk; Wed, 18 Feb 2015 00:26:17 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.22]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9380C1A9105; Wed, 18 Feb 2015 00:26:17 -0800 (PST)
Received: from [192.168.131.129] ([80.92.119.127]) by mail.gmx.com (mrgmx102) with ESMTPSA (Nemesis) id 0MEtba-1YMOSa3U7e-00G12a; Wed, 18 Feb 2015 09:26:15 +0100
Message-ID: <54E44C51.3070800@gmx.net>
Date: Wed, 18 Feb 2015 09:24:49 +0100
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.4.0
MIME-Version: 1.0
To: Daniel Migault <mglt.ietf@gmail.com>
References: <CADZyTkkqjSQe1HvMhLqg1g1-bxGc3iXB8kjL81qJgieCwV6h8Q@mail.gmail.com> <54E36E1F.60203@gmx.net> <CADZyTkkBOfRC+TKFgta7pDZHR7LwJAB4BqZrwhwA6DjKA3dFKg@mail.gmail.com>
In-Reply-To: <CADZyTkkBOfRC+TKFgta7pDZHR7LwJAB4BqZrwhwA6DjKA3dFKg@mail.gmail.com>
OpenPGP: id=4D776BC9
Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="FnBvP4Hkksch2As2kMqFwNIhMFmQnFecS"
X-Provags-ID: V03:K0:2vpVSgOREUYfzjWo2scf2S3jsilwh8kbwFHRCli5NHVqdNC6eVk KEoJpUgThxqQ+cv/5J5Bbjafqp1o/uKeqVpnT1b9ZlM+C8p7cADeSVrnQkzDvkJjgCNEDDr 2IFBU1w7qfiTWYdAYvhLYaLIXUU2WmiVTb7P6ogWqtXlAgt7Lt0FTliw1YnqFg3d4d6DKbT gILFu4jrdEBXyzjD0i05w==
X-UI-Out-Filterresults: notjunk:1;
Archived-At: <http://mailarchive.ietf.org/arch/msg/ipsec/8jOT6MhE1M-hluezzfHE7CGtZD4>
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, "6lo@ietf.org" <6lo@ietf.org>
Subject: Re: [IPsec] Diet-ESP
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Feb 2015 08:26:20 -0000

Hi Daniel,

I would like to understand your use case a bit better. Just securing
sensor communication is not enough.

What application layer protocols do you expect to run on these devices?
What radio technologies do you assume are going to be used?
How does the envisioned stack on these devices look like?

Ciao
Hannes

On 02/18/2015 04:44 AM, Daniel Migault wrote:
> Hi Hannes,
> 
> We designing Diet-ESP was to enable motes to secure their communications
> and provide end-to-end security. This function is important for us and I
> guess we are not the only one interested in this functionality.
> 
> We believe it is worth exposing how IPsec can be use to fit the IoT
> constraints, regardless of what other protocols are providing.
> 
> There are probably other alternatives (like DTLS), however :
>     - a) DTLS/IPsec address different use cases
>     - b) no real comparison have been made possible between these
> security protocols designed for IoT, and we believe IPsec is pretty
> efficient.
> 
> Current spec may not be perfect. However, the impact on security can
> largely be under control. First of all Diet-ESP results in the
> combination of ROHC ROHCoverIPsec which are already standard with deep
> security reviews. Then most of the compressed fields are not security
> related. Padding, Pad Len, Next Header have nothing to deal with security.
> 
> Security related fields are SN, ICV, SPI. SN and SPI are compressed
> means that they have to be decompressed before applying IPsec/ESP.
> Because of the compression/decompression these fields are not altered
> and from an IPsec/ESP perspective compression is transparent. On the
> other hand, appropriate values MUST be chosen so
> compression/decompression can occur.
> 
> In the case of the ICV, this value cannot be decompressed, and thus we
> have to make things right. Two alternatives are proposed and I would be
> happy to update the draft with the best one.
> 
> If you have specific security impacts in mind, please let us know.
> 
> BR,
> Daniel
> 
> 
> On Tue, Feb 17, 2015 at 5:36 PM, Hannes Tschofenig
> <hannes.tschofenig@gmx.net <mailto:hannes.tschofenig@gmx.net>> wrote:
> 
>     Daniel,
> 
>     I understand that you spend a lot of time in writing these
>     specifications but, as mentioned in the past I just do not see the need
>     for this type of standardization activity. Nobody I have spoken with
>     asks for this functionality.
> 
>     If there is indeed a need for IPsec ESP use in IoT then I am not sure
>     that the proposed optimizations are so useful given the impact for
>     security.
> 
>     Ciao
>     Hannes
> 
>     On 02/17/2015 04:08 AM, Daniel Migault wrote:
>     > Please find the new version of Diet-ESP a compress IPsec/ESP for IoT. We
>     > have implemented and tested Diet-ESP. Compared to the standard
>     > IPsec/ESP, Diet-ESP can reduce the networking overhead added to
>     > unprotected data from 100% to a few percent. I will be happy to present
>     > these draft next IETF.
>     >
>     > Feel free to make comments!
>     >
>     > The drafts includes:
>     >     1) draft-mglt-6lo-diet-esp-requirements
>     >
>     <http://datatracker.ietf.org/doc/draft-mglt-6lo-diet-esp-requirements/>:
>     > lists the requirements for Diet-ESP
>     >     2) draft-mglt-6lo-aes-implicit-iv
>     > <http://datatracker.ietf.org/doc/draft-mglt-6lo-aes-implicit-iv/>:
>     > indicates how to avoid carrying the IV in each ESP packet. It is instead
>     > generated by each peers. The protocols described in the draft can be
>     > used with the regular IPsec/ESP.
>     >     3) draft-mglt-6lo-diet-esp
>     > <http://datatracker.ietf.org/doc/draft-mglt-6lo-diet-esp/>
>     describes the
>     > core Diet-ESP protocol, that is how to compress/decompress each fields
>     > of the standard IPsec/ESP. Compression is discribed through a Diet-ESP
>     > Context.
>     >     4) draft-mglt-6lo-diet-esp-payload-compression
>     >
>     <http://datatracker.ietf.org/doc/draft-mglt-6lo-diet-esp-payload-compression/>:
>     > describes how the clear text can be compressed before encryption. In
>     > fact unless IPsec/ESP is used with NULL encryption, the data in the ESP
>     > packet is encrypted. Encryption makes compression hard to perform.
>     > Instead compressing before encrypting can be very efficient. This makes
>     > possible to remove UDP/TPC/IP tunnel headers.
>     >     5) draft-mglt-6lo-diet-esp-context-ikev2-extension
>     >
>     <http://datatracker.ietf.org/doc/draft-mglt-6lo-diet-esp-context-ikev2-extension/>:
>     > describes how to negociate Diet-ESP with IKEv2. In fact this mostly
>     > result in an agreement for the DIet-ESP Context. This exchange may then
>     > be extended to Diet-HIP Exchange.
>     >
>     > BR,
>     > Daniel
>     > --
>     > Daniel Migault
>     > Orange Labs -- Security
>     > +33 6 70 72 69 58 <tel:%2B33%206%2070%2072%2069%2058>
>     >
>     >
>     > _______________________________________________
>     > IPsec mailing list
>     > IPsec@ietf.org <mailto:IPsec@ietf.org>
>     > https://www.ietf.org/mailman/listinfo/ipsec
>     >
> 
> 
> 
> 
> -- 
> Daniel Migault
> Ericsson
> 
> 
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
>