Re: [IPsec] comments on esp-null-heuristics-01

Tero Kivinen <kivinen@iki.fi> Tue, 24 November 2009 14:32 UTC

Return-Path: <kivinen@iki.fi>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0EF223A69A2 for <ipsec@core3.amsl.com>; Tue, 24 Nov 2009 06:32:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.562
X-Spam-Level:
X-Spam-Status: No, score=-2.562 tagged_above=-999 required=5 tests=[AWL=0.038, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jNJlOAtPj+BR for <ipsec@core3.amsl.com>; Tue, 24 Nov 2009 06:32:21 -0800 (PST)
Received: from mail.kivinen.iki.fi (fireball.acr.fi [83.145.195.1]) by core3.amsl.com (Postfix) with ESMTP id CBD363A6861 for <ipsec@ietf.org>; Tue, 24 Nov 2009 06:32:20 -0800 (PST)
Received: from fireball.kivinen.iki.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.14.3/8.14.3) with ESMTP id nAOEWCMO002792 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ipsec@ietf.org>; Tue, 24 Nov 2009 16:32:12 +0200 (EET)
Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.14.3/8.12.11) id nAOEWBK1003097; Tue, 24 Nov 2009 16:32:11 +0200 (EET)
Date: Tue, 24 Nov 2009 16:32:11 +0200
Resent-From: kivinen@iki.fi
Message-Id: <200911241432.nAOEWBK1003097@fireball.kivinen.iki.fi>
X-Authentication-Warning: fireball.kivinen.iki.fi: kivinen set sender to kivinen@iki.fi using -f
Resent-Message-ID: <19211.61035.901278.727206@fireball.kivinen.iki.fi>
Resent-Date: Tue, 24 Nov 2009 16:32:11 +0200
Resent-To: ipsec@ietf.org
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
From: Tero Kivinen <kivinen@iki.fi>
To: Michael Richardson <mcr@sandelman.ca>
In-Reply-To: <6762.1258985518@marajade.sandelman.ca>
References: <10247.1257346966@marajade.sandelman.ca> <19210.35881.683962.654367@fireball.kivinen.iki.fi> <6762.1258985518@marajade.sandelman.ca>
X-Authentication-Warning: fireball.kivinen.iki.fi: kivinen set sender to kivinen@iki.fi using -f
X-Mailer: VM 7.19 under Emacs 21.4.1
X-Edit-Time: 1 min
X-Total-Time: 0 min
Cc: ipsec@ietf.org
Subject: Re: [IPsec] comments on esp-null-heuristics-01
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Nov 2009 14:32:22 -0000

Michael Richardson writes:
>     >> It is?  I'll bet 95% of actual transport mode IPsec has an L2TP
>     >> layer inside.
> 
>     Tero> Inside one enterprise? I do not think so. I guess most of the
>     Tero> IPsec traffic is VPN style tunnel mode, but as that is going
>     Tero> over untrusted networks (there is word private there :) they
>     Tero> are encrypted, thus outside the scope of this draft.
> 
>   I see the "inside one organization" part now.
>   I was thinking that much of the transport-mode traffic crossing an
> enterprises' border is likely on-site consultants, who are doing remote
> access back to their HQ.

Yes, but those consultants do use encryption when connecting to the
enterprise network.

Most likely their encrypted traffic is terminated on the security
gateway on the enterprise network border, and then it might go forward
without encryption (it might have end to end ESP-NULL inside the
encrypted tunnel mode ESP when it arrives to the sgw, and sgw might
strip encrypted tunnel mode ESP out and leave transport mode ESP-NULL
inside).

>     Tero> I added a note there saying:
> 
>     Tero>   Note, that most of the current uses of the IPsec are not
>     Tero> host to host traffic inside one organization, but for the
>     Tero> intended use cases for the heuristics this will most likely be
>     Tero> the case. Also tunnel mode case is much easier to solve than
>     Tero> transport mode as it is much easier to detect the IP header
>     Tero> inside the ESP-NULL packet.
> 
>   I think that's 5%, with 95% being above, but maybe I don't know why
> this stateful inspection device is "inside"

It is "inside" as I do not belive anybody belives they could leave
encryption off for traffic that goes outside of the enterprise...

Remember that all of this is always talking about ESP-NULL traffic
only.

> 
>     >> I agree with the analysis of section 3, in particular the
>     >> explanation of how hardware can be programmed to statefully match
>     >> the ESP-NULL flows.  It might be worth noting that NAT-T ESP-NULL
>     >> flows *ALREADY* have a 5-tuple (likely unique) marker, and that
>     >> if the inspector is also a NA(P)T, that it already is keeping the
>     >> right state.
> 
>     Tero> Do you have any exact wordings where to add what.
> 
>   I think that there is later on text about this, and maybe just a
> forward reference is enough. 
>         "As described in section 7, UDP encapsulated ESP traffic
>         may also have have NAPT applied to it, and so there is already
>         a 5-tuple state in the stateful inspection gateway

Ok, added that to the end of section 3. "

>     Tero>    Flow
>     Tero>       TCP/UDP or IPsec flow is a stream of packets part of the
>     Tero> same TCP/ UDP or IPsec stream, i.e.  TCP flow is a stream of
>     Tero> packets having same 5 tuple (source and destination ip and
>     Tero> port, and TCP protocol).
> 
>   okay, I would run this by the transport and Internet area folks,
> because I think this disagrees with their definition of flow.

How does that disagree in their definition of flow?

On the other hand it really does not matter whether it disagrees or
not, this is what we mean by flow in this document, so as we define it
there, it should be clear for people what we mean by flow.
-- 
kivinen@iki.fi