[IPsec] IPsec/Diet-ESP for IoT and Minimal ESP

Daniel Migault <mglt.ietf@gmail.com> Fri, 31 January 2014 14:48 UTC

Return-Path: <mglt.ietf@gmail.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9AE8E1A0064; Fri, 31 Jan 2014 06:48:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y0v27GMR_laG; Fri, 31 Jan 2014 06:48:17 -0800 (PST)
Received: from mail-wg0-x232.google.com (mail-wg0-x232.google.com [IPv6:2a00:1450:400c:c00::232]) by ietfa.amsl.com (Postfix) with ESMTP id AAC9B1A020C; Fri, 31 Jan 2014 06:48:16 -0800 (PST)
Received: by mail-wg0-f50.google.com with SMTP id l18so9102324wgh.5 for <multiple recipients>; Fri, 31 Jan 2014 06:48:12 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=e5av1DSGZsFTk/UHfhKFrgPp27dwhqpN7flBjKw4LIs=; b=QzSkaI15ZZY6yYJ1jVyM9KXLhUV2V6V92SHHVhn/ltw8I9xIXhdg5LNL0YS4189TGO BdAz06f+NK/B1/rm/NCYTWX4SP0sHd6Z5U8i6tpJvDYwlcMRAFO0rF/R5d8Csjfns0Bv fjKWBydcI9rzUPQY46cCxnobJWnhGR4GuEb2MG/KqkDr8HVYLJ7TLmyOEiga6Dqh6ldK ttgea4XAesJrZu/BjusovxxHP5nSrtQC6yNxZzKjEoWHcsDjC7WLgApXuPK8dRT/yzvw ARj1IdJ/P4TfNHCUAOtJczcK/tpDgiEegecKnmSPYZc1yB/Cqyzgbdot7HCS66GtKaGq bJsQ==
MIME-Version: 1.0
X-Received: by 10.180.94.67 with SMTP id da3mr14287274wib.38.1391179692606; Fri, 31 Jan 2014 06:48:12 -0800 (PST)
Received: by 10.194.171.129 with HTTP; Fri, 31 Jan 2014 06:48:12 -0800 (PST)
Date: Fri, 31 Jan 2014 15:48:12 +0100
Message-ID: <CADZyTk=GRC4kN5mXobgzeZJ+k44dxZHLaW49z8dFkjt0N=C5aw@mail.gmail.com>
From: Daniel Migault <mglt.ietf@gmail.com>
To: "ipsec@ietf.org" <ipsec@ietf.org>, dtls-iot@ietf.org
Content-Type: text/plain; charset="ISO-8859-1"
Subject: [IPsec] IPsec/Diet-ESP for IoT and Minimal ESP
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 31 Jan 2014 14:48:19 -0000

Hi,

Please find the two drafts we have just posted. They are about
IPsec/ESP minimal implementation and Diet-ESP designed for IoT.

Comment are welcome!

Best Regards,
Daniel


Name:        draft-mglt-dice-diet-esp
Revision:    00
Title:        Diet-ESP: a flexible and compressed format for IPsec/ESP
Document date:    2014-01-31
Group:        Individual Submission
Pages:        21
URL:http://www.ietf.org/internet-drafts/draft-mglt-dice-diet-esp-00.txt
Status:https://datatracker.ietf.org/doc/draft-mglt-dice-diet-esp/
Htmlized:http://tools.ietf.org/html/draft-mglt-dice-diet-esp-00


Abstract:
   IPsec/ESP has been designed to secure IP packets exchanged between
   two nodes.  IPsec implements security at the IP layer which makes
   security transparent to the applications, as opposed to TLS or DTLS
   that requires application to implement TLS/DTLS.  As a result, IPsec
   enable to define the security rules in a similar way one establishes
   firewall rules.

   One of the IPsec's drawbacks is that implementing security on a per
   packet basis adds overhead to each IP packet.  Considering IoT
   devices, the data transmitted over an IP packet is expected to be
   rather small, and the cost of sending extra bytes is so high that
   IPsec/ESP can hardly be used for IoT as it is currently defined in
   RFC 4303.

   This document defines Diet-ESP, a protocol that compress and reduce
   the ESP overhead of IPsec/ESP so that it can fit security and energy
   efficient IoT requirements.  Diet-ESP use already existing mechanism
   like IKEv2 to negotiate the compression format.  Furthermore a lot of
   information, already existing for an IPsec Security Association, are
   reused to offer light negotiation in addition to maximum compression.


Name:        draft-mglt-lwig-minimal-esp
Revision:    00
Title:        Minimal ESP
Document date:    2014-01-31
Group:        Individual Submission
Pages:        6
URL:http://www.ietf.org/internet-drafts/draft-mglt-lwig-minimal-esp-00.txt
Status:https://datatracker.ietf.org/doc/draft-mglt-lwig-minimal-esp/
Htmlized:http://tools.ietf.org/html/draft-mglt-lwig-minimal-esp-00


Abstract:
   This document describes a minimal version of the IP Encapsulation
   Security Payload (ESP) described in RFC 4303 which is part of the
   IPsec suite.

   ESP is used to provide confidentiality, data origin authentication,
   connectionless integrity, an anti-replay service (a form of partial
   sequence integrity), and limited traffic flow confidentiality.

   This document does not update or modify RFC 4303, but provides a
   compact description of the minimal version of the protocol.  If this
   document and RFC 4303 conflicts then RFC 4303 is the authoritative
   description.


-- 
Daniel Migault
Orange Labs -- Security
+33 6 70 72 69 58