Re: proposed IPSEC changes/extensions
Steven Bellovin <smb@research.att.com> Sat, 02 November 1996 01:44 UTC
To: Hilarie Orman <ho@earth.hpc.org>
cc: kent@bbn.com, ipsec@TIS.COM
Subject: Re: proposed IPSEC changes/extensions
Date: Fri, 01 Nov 1996 20:44:58 -0500
From: Steven Bellovin <smb@research.att.com>
Sender: ipsec-approval@neptune.tis.com
Precedence: bulk
Message-ID: <9611040742.aa27436@neptune.TIS.COM>
It's not good to see the design process driven by the perceived difficulty of modifying an old base and the perceived difficulty of getting through standards process. I'd intended to wait a few days before posting this, but... The issue isn't one of process. Rather, it's what we know how to do. We know (or think we know) how to build ESP and AH. Many of us have a few qualms about pieces of the spec, but they're not worth revisiting anymore -- we have a spec and it works. I'm much less sanguine that we know how to do compression. We don't have a spec (or rather, if we do have one, I couldn't find it; the best I found was draft-thayer-seccomp-00.txt, and it referenced a BoF for technical details), and there are some obvious technical details in implementing compression over a lossy medium such as IP. Yes, there's a requirement for a resync bit -- but does that imply a need for compression-level NAK packets, to say that something was dropped, and that we need to resync? (Possibly all of these objections have been dealt with in the technical draft -- I haven't seen it, which is why I had wanted to wait.) My estimate is that it will take about a year before we have a clean spec for compression, independent of the standards process. I don't want to wait until then to start deploying IPSEC. Nor am I convinced that we know what fields to add now to the ESP header, to leave room for compression. The question of one versus two sequence numbers is mostly irrelevant. Even if we have only one, there's no reason why ESP cannot pass the value to the decompressor. That's a matter of interface design -- and if we so choose, we will impose a new requirement on the interface. It isn't clear that an additional sequence number would add more probable plaintext. If the starting point was random, you'd need a two-packet attack to start. And looking at the draft I cited, I'd say that at least 44 bits of the remaining 48 are predictable for a simpler single-packet attack. (The sequence number field is 16 bits in that draft.) I'd also want to look at what the beginning of the compressed packet looked like. Date: Sun, 3 Nov 1996 18:18:54 -0800 From: Ran Atkinson <rja@cisco.com> Message-Id: <199611040218.SAA15844@cornpuffs.cisco.com> To: sommerfeld@apollo.hp.com Subject: Re: proposed IPSEC changes/extensions In-Reply-To: <199611012212.RAA01728@thunk.orchard.medford.ma.us> References: <9610292001.AA22994@secpwr.watson.ibm.com> Organization: cisco Systems Cc: ipsec@TIS.COM Sender: ipsec-approval@neptune.tis.com Precedence: bulk In article <199611012212.RAA01728@thunk.orchard.medford.ma.us>, Bill Sommerfeld wrote: >Definitely. the current isakmp-05 draft says: > > In particular, key lifetimes and SA lifetimes are purely a local > issue, and should not be negotiated. > >I think this is *very* wrong. It means that a receiver can terminate >an SA while the sender still thinks its valid... this will set off >false alarms when incoming traffic fails to decrypt/verify, and freeze >user traffic for several RTT's while the key mgmt protocols try to >resynchronize. Very clumsy.. I agree with Bill on this. The next ISAKMP draft should provide specific support for negotiating soft and hard SA lifetimes. >ISAKMP currently handles SA removal with explicit DELETE messages, but >it would be more efficient, in general, to let idle SA's expire >without the need to send messages (consider demand-dial links .. you >probably want the SA to live longer than the demand-dial idle timeout, >and it would be silly to bring the link up just to send a DELETE >message..). Yes, though the DELETE message is useful in other cases (e.g. one side believes the SA to be compromised and wants to ensure the other side does not use that SA any longer). Ran rja@cisco.com Date: Mon, 4 Nov 1996 13:18:45 +0200 (EET) From: Santeri Paavolainen <santtu@mail.cs.hut.fi> To: ipsec@TIS.COM Subject: Re: proposed IPSEC changes/extensions In-Reply-To: <199611011912.OAA01596@thunk.orchard.medford.ma.us> Message-ID: <Pine.SUN.3.91.961104122622.11989B-100000@hutcs-2.cs.hut.fi> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: ipsec-approval@neptune.tis.com Precedence: bulk On Fri, 1 Nov 1996, Bill Sommerfeld wrote: > > Even if compression and replay prevention both require state, their state > > is separate from each other's state. Compression does not need to know > > anything about replay prevention's state to work. Why should they be > > defined in the protocol to be contained both in a single > > transformation? > > Both replay prevention and stateful compression require sequence > numbering of some sort. Putting two sequence numbers which are > stepped identically in a packet is wasteful; it also *potentially* > increases the amount of predictable plaintext in a message (a concern > which Steve Bellovin has raised on at least one occasion).. Still I do not count such synergy to be good enough reason to include both of them in a single transformation. Also all the ciphers must themselves somehow address known-plaintext attacks, and I would not combine replay prevention and combination just on the basis of "common sequence number". I object to any transformation whose behaviour can be changed on anything else that counts as a "key". If the compression part of this mega-transformation is optional it should be defined as a separate transformation which can be optionally applied or not. We should not except that the only application of IPSEC is critically secure data links -- a large portion of traffic containet withing IPSEC will be non-confidential TCP traffic. TCP is inherently safe from replay prevention, and no cryptographic security is needed. The only item of interest is authentication, eg. tamperproof connections. These would probably also benefit from compression. We can either define a single huge transformation with a lot of options: CRYPTO-HASH-REPLAYPREVENTION-COMPRESS (crypto, hash, replayprevention and compression all optional) or a lot of smaller transformations CRYPTO HASH REPLAYPREVENTION and COMPRESS and apply them layer by layer in any such combination we deem necessary. Notice that is the mega-transformation uses any component which fails, such as MD5 instead of SHA, the whole specification has to be changed. With multiple component transformations one can tailor the whole combination to their needs. That is, for a regular WWW page access the user is mostly interested that the data that is sent is the same data they receive, thus just the HASH transformation is necessary (TCP has its own state). Anything more would be overkill. Thus to satisfy all the possible needs we would have to specify all the sub-components of the mega-transformation as a separate pieces anyway. So do what is the need for such mega-transformation in the first place if we can have the same effect by combining smaller transformations? I say there is no need. The issues about implementation efficiency are just that, an implementation issue. I am not advocating for us to draft "bad" specifications that would make efficient implementations impossible, but I do not either want to be hindered by only considering the efficiency issues. There is the problem of known-plaintext in layered transformations. We should always consider SPI as known plaintext (it could be obtained by breaking the key management traffic, for example), thus if we do AH<-CRYPT<-COMPRESS for example we in effect supply at least 8 bytes of known plaintext for the cryptanalyst for breaking the CRYPT portion of such combined transformation. On the other hand - none of the cryptographic methods used should except "good" input, eg. such that is inherently unguessable. I am saying that any cryptographic transformation falling on these 8 bytes of known plaintext is unusable in the first place. If we are using IPSEC in a tunnel mode, the IP header itself offers a much better target than any compression or other transformation header anyway. If we are so concerned about security, we should not include the COMPRESS transformation in the first place (with a change of views: we should, as it increases entropy per byte). Or apply a stronger cipher. What good is of an IV, anyway? :-) -- sjpaavol@cc.Helsinki.FI I have become death, destroyer of the worlds. Received: from relay.hq.tis.com by neptune.TIS.COM id aa04340; 4 Nov 96 8:44 EST Received: by relay.hq.tis.com; id IAA02883; Mon, 4 Nov 1996 08:49:02 -0500 Received: from clipper.hq.tis.com(10.33.1.2) by relay.tis.com via smap (V3.1.1) id xma002881; Mon, 4 Nov 96 08:48:43 -0500 Received: from relay.hq.tis.com (firewall-user@relay.hq.tis.com [10.33.1.1]) by clipper.hq.tis.com (8.7.5/8.7.3) with SMTP id IAA03147 for <ipsec@tis.com>; Mon, 4 Nov 1996 08:50:17 -0500 (EST) Received: by relay.hq.tis.com; id IAA02863; Mon, 4 Nov 1996 08:48:35 -0500 Received: from volitans.morningstar.com(137.175.2.11) by relay.tis.com via smap (V3.1.1) id xma002852; Mon, 4 Nov 96 08:48:08 -0500 Received: from carp.morningstar.com by volitans.MorningStar.Com (8.7.1/95070701) id IAA13788; Mon, 4 Nov 1996 08:50:00 -0500 (EST) Received: by carp.morningstar.com (8.7.5/95031605) id IAA01459; Mon, 4 Nov 1996 08:51:09 -0500 (EST) Date: Mon, 4 Nov 1996 08:51:09 -0500 (EST) Message-Id: <199611041351.IAA01459@carp.morningstar.com> From: Karl Fox <karl@ascend.com> To: Steven Bellovin <smb@research.att.com> Cc: Hilarie Orman <ho@earth.hpc.org>, kent@bbn.com, ipsec@TIS.COM Subject: Re: proposed IPSEC changes/extensions In-Reply-To: <9611040742.aa27436@neptune.TIS.COM> References: <9611040742.aa27436@neptune.TIS.COM> Reply-To: Karl Fox <karl@ascend.com> Organization: Ascend Communications Sender: ipsec-approval@neptune.tis.com Precedence: bulk Steven Bellovin writes: > Yes, there's a requirement for a resync bit -- but does that imply > a need for compression-level NAK packets, to say that something was > dropped, and that we need to resync? Feedback in compression isn't always necessary. There's always the `reset-every-n-packets' method. > My estimate is that it will take about a year before we have a clean > spec for compression, independent of the standards process. I don't > want to wait until then to start deploying IPSEC. I agree completely. > Nor am I convinced that we know what fields to add now to the ESP > header, to leave room for compression. I disagree--I don't think any compression fields belong in the ESP header. As I've said before (with no comment from others), I think all compression header fields should be encrypted, and should be as small as possible to reduce the amount of guessable plaintext. -- Karl Fox, servant of God, employee of Ascend Communications 3518 Riverside Drive, Suite 101, Columbus, Ohio 43221 +1 614 326 6841 Received: from relay.hq.tis.com by neptune.TIS.COM id aa07283; 4 Nov 96 9:12 EST Received: by relay.hq.tis.com; id JAA03663; Mon, 4 Nov 1996 09:17:03 -0500 Received: from clipper.hq.tis.com(10.33.1.2) by relay.tis.com via smap (V3.1.1) id xma003655; Mon, 4 Nov 96 09:16:39 -0500 Received: from relay.hq.tis.com (firewall-user@relay.hq.tis.com [10.33.1.1]) by clipper.hq.tis.com (8.7.5/8.7.3) with SMTP id JAA04994 for <ipsec@tis.com>; Mon, 4 Nov 1996 09:18:14 -0500 (EST) Received: by relay.hq.tis.com; id JAA03646; Mon, 4 Nov 1996 09:16:33 -0500 Received: from ercole.cefriel.it(131.175.5.10) by relay.tis.com via smap (V3.1.1) id xma003596; Mon, 4 Nov 96 09:16:07 -0500 Received: from espo.cefriel.it ([131.175.4.136]) by ercole.cefriel.it (8.7.5/8.7.3) with SMTP id PAA14622 for <ipsec@TIS.COM>; Mon, 4 Nov 1996 15:13:22 +0100 (MET) Message-Id: <2.2.32.19961104141339.0068bdbc@mailer.cefriel.it> X-Sender: esposito@mailer.cefriel.it X-Mailer: Windows Eudora Pro Version 2.2 (32) Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Date: Mon, 04 Nov 1996 15:13:39 +0100 To: ipsec@TIS.COM From: Sergio Esposito <esposito@ercole.cefriel.it> Subject: IPsec implementations Sender: ipsec-approval@neptune.tis.com Precedence: bulk Hi, are there free downloadable IPSec implementations for Solaris that are available outside the U.S.? Thanks in advance for your kind response, Sergio Esposito ============================================================================ Organization : CEFRIEL Address : Via Emanueli, 15 - 20126 MILANO (Italy) Phone : +39-2-66161.211 / +39-2-66161.1 FAX : +39-2-66161.448 Interests : IPv6, IPSec, VPN e-mail : esposito@mailer.cefriel.it www : ============ Received: from relay.hq.tis.com by neptune.TIS.COM id aa14526; 4 Nov 96 10:22 EST Received: by relay.hq.tis.com; id KAA06695; Mon, 4 Nov 1996 10:27:05 -0500 Received: from clipper.hq.tis.com(10.33.1.2) by relay.tis.com via smap (V3.1.1) id xma006677; Mon, 4 Nov 96 10:26:43 -0500 Received: from relay.hq.tis.com (firewall-user@relay.hq.tis.com [10.33.1.1]) by clipper.hq.tis.com (8.7.5/8.7.3) with SMTP id KAA12959 for <ipsec@tis.com>; Mon, 4 Nov 1996 10:28:17 -0500 (EST) Received: by relay.hq.tis.com; id KAA06648; Mon, 4 Nov 1996 10:26:35 -0500 Received: from border.com(199.71.190.98) by relay.tis.com via smap (V3.1.1) id xma006565; Mon, 4 Nov 96 10:26:12 -0500 Received: by janus.border.com id <18438-2>; Mon, 4 Nov 1996 10:25:29 -0500 Message-Id: <96Nov4.102529est.18438-2@janus.border.com> To: Hilarie Orman <ho@earth.hpc.org> MMDF-Warning: Unable to confirm address in preceding line at neptune.TIS.COM MMDF-Warning: Unable to confirm address in preceding line at neptune.TIS.COM cc: kent@bbn.com, ipsec@TIS.COM Subject: Re: proposed IPSEC changes/extensions References: <199611012102.QAA26649@earth.hpc.org> In-reply-to: ho's message of "Fri, 01 Nov 1996 16:02:53 -0500". <199611012102.QAA26649@earth.hpc.org> From: "C. Harald Koch" <chk@border.com> MMDF-Warning: Unable to confirm address in preceding line at neptune.TIS.COM Organization: Secure Computing Canada Ltd. Phone: +1 416 368 7157 X-uri: <URL:http://www.eng.border.com/homes/chk/> X-Face: )@F:jK?*}hv!eJ}*r*0DD"k8x1.d#i>7`ETe2;hSD2T!:Fh#wu`0pW7lO|Dfe'AbyNy[\Pw z'.bAtgTM!+iq2$yXiv4gf<:D*rZ-|f$\YQi7"D"=CG!JB?[^_7v>8Mm;z:NJ7pss)l__Cw+.>xUJ) did@Pr9 Date: Mon, 4 Nov 1996 10:25:57 -0500 Sender: ipsec-approval@neptune.tis.com Precedence: bulk In message <199611012102.QAA26649@earth.hpc.org>, Hilarie Orman writes: > It's not good to see the design process driven by the perceived difficulty > of modifying an old base and the perceived difficulty of getting through > standards process. A standard that no-one adopts is worse than no standard at all. -- C. Harald Koch chk@border.com Received: from relay.hq.tis.com by neptune.TIS.COM id aa15779; 4 Nov 96 10:35 EST Received: by relay.hq.tis.com; id KAA07454; Mon, 4 Nov 1996 10:40:06 -0500 Received: from clipper.hq.tis.com(10.33.1.2) by relay.tis.com via smap (V3.1.1) id xma007435; Mon, 4 Nov 96 10:39:44 -0500 Received: from relay.hq.tis.com (firewall-user@relay.hq.tis.com [10.33.1.1]) by clipper.hq.tis.com (8.7.5/8.7.3) with SMTP id KAA13747 for <ipsec@tis.com>; Mon, 4 Nov 1996 10:41:22 -0500 (EST) Received: by relay.hq.tis.com; id KAA07396; Mon, 4 Nov 1996 10:39:37 -0500 Received: from zafu.bbn.com(128.89.0.25) by relay.tis.com via smap (V3.1.1) id xma007390; Mon, 4 Nov 96 10:39:30 -0500 Received: from [128.89.0.110] (COMSEC.BBN.COM [128.89.0.110]) by zafu.bbn.com (8.7.5/8.6.5) with SMTP id KAA20281 for <ipsec@TIS.COM>; Mon, 4 Nov 1996 10:41:29 -0500 (EST) X-Sender: kent@po1.bbn.com Message-Id: <v02130510aea3bc01b554@[128.89.0.110]> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Date: Mon, 4 Nov 1996 10:43:07 -0500 To: ipsec@TIS.COM From: Stephen Kent <kent@bbn.com> Subject: Re: proposed IPSEC changes/extensions Sender: ipsec-approval@neptune.tis.com Precedence: bulk Folks, I think the concensus is that we should NOT include compression in ESP, for a bariety of reasons. So, the revised ESP document will not include ANY hooks for compression, reserved fields, etc. Note, however, that we are moving away from the notion of transforms as bundled sets of algorithms described in a single document. Instead, we are defining the algorithms separately, and the notion of a transform will appear only in a document that describes the combinations of algorithms that are negotiated during SA establishment. It will cite these algorithms by reference to appropriate RFCs, but wil not provide processing descriptions, etc. Thus I do not see how to include compression into ESP processing at some later time. If we keep it as a separate protocol, that's fine, but don't count on some more optimized version that is tightly integrated into ESP. Steve Received: from relay.hq.tis.com by neptune.TIS.COM id aa15910; 4 Nov 96 10:37 EST Received: by relay.hq.tis.com; id KAA07556; Mon, 4 Nov 1996 10:41:36 -0500 Received: from clipper.hq.tis.com(10.33.1.2) by relay.tis.com via smap (V3.1.1) id xma007550; Mon, 4 Nov 96 10:41:15 -0500 Received: from relay.hq.tis.com (firewall-user@relay.hq.tis.com [10.33.1.1]) by clipper.hq.tis.com (8.7.5/8.7.3) with SMTP id KAA13902 for <ipsec@tis.com>; Mon, 4 Nov 1996 10:42:49 -0500 (EST) Received: by relay.hq.tis.com; id KAA07523; Mon, 4 Nov 1996 10:41:07 -0500 Received: from zafu.bbn.com(128.89.0.25) by relay.tis.com via smap (V3.1.1) id xma007490; Mon, 4 Nov 96 10:40:39 -0500 Received: from [128.89.0.110] (COMSEC.BBN.COM [128.89.0.110]) by zafu.bbn.com (8.7.5/8.6.5) with SMTP id KAA20291; Mon, 4 Nov 1996 10:41:32 -0500 (EST) X-Sender: kent@po1.bbn.com Message-Id: <v02130511aea3bd9313c1@[128.89.0.110]> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Date: Mon, 4 Nov 1996 10:43:11 -0500 To: Karl Fox <karl@ascend.com> From: Stephen Kent <kent@bbn.com> Subject: Re: proposed IPSEC changes/extensions Cc: Steven Bellovin <smb@research.att.com>, Hilarie Orman <ho@earth.hpc.org>, ipsec@TIS.COM MMDF-Warning: Unable to confirm address in preceding line at neptune.TIS.COM MMDF-Warning: Unable to confirm address in preceding line at neptune.TIS.COM Sender: ipsec-approval@neptune.tis.com Precedence: bulk Karl, I think the imprortance of reducing guessable plaintext introduced by fixed (guessable) headres is sometimes overstated. Let's just work on designing the protocols to work correctly and assume that the crypto will be secure under assumptions of known (and chosen) plaintext attacks. This is a sufficiently hard task. Steve Date: Mon, 04 Nov 1996 10:20:54 -0800 To: Santeri Paavolainen <santtu@cs.hut.fi> From: Bob Monsour <rmonsour@earthlink.net> Subject: Re: proposed IPSEC changes/extensions Cc: ipsec@TIS.COM Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: ipsec-approval@neptune.tis.com Precedence: bulk Message-ID: <9611041337.aa03289@neptune.TIS.COM> At 03:24 PM 11/1/96 +0200, Santeri Paavolainen wrote: >On Thu, 31 Oct 1996, Bill Sommerfeld wrote: >> > Isn't stateful compression most logically done as a separate >> > protocol, performed prior to any IPSEC encryption? >> >> Maybe from a "purity of layers" perspective, but stateful compression >> requires similar message-sequencing goop as replay detection; there >> are likely some real efficiencies from handling both at the same >> time.. > >True, but unless there is a good reason to put both of them into a single >transformation they should be kept separate. Recall that the reason that the replay prevention counter was originally suggested to be used as the compression sequence number was due to the draft which combined compression with 3DES, replay prevenion and HMAC as a single defined (and singly documented) transform. Unfortunate as the timing was, that draft was posted just as the requirement to reduce all the specific transforms, i.e., 3DES, HMAC, compression, etc., to separate documents and having the ESP draft accommodate each of them so as to avoid transform explosion. There is clearly no specific need, nor requirement, to combine the use of those two sequence numbers. FYI, the draft that combined those functions was announced as follows: Title : Combined 3DES-CBC, LZS Compression, HMAC, and Replay Prevention ESP Transform Author(s) : M. Sabin, R. Monsour Filename : draft-sabin-esp-des3-lzs-md5-00.txt Pages : 18 Date : 10/23/1996 This document proposes the "3DES-CBC-LZS-HMAC-Replay" security transform for the IP Encapsulating Security Payload (ESP). The proposed transform combines triple-DES encryption, LZS compression, HMAC authentication, and replay prevention into a single packet format. The transform is compatible with implementations that do not support compression and with implementations that support only single-DES encryption. Compression is performed prior to encryption, which has the side benefit of reducing the amount of data that must be encrypted. This document is based on the IPsec Working Group's proposed "Combined DES-CBC, HMAC, and Replay Prevention Security Transform," cited later in this document. Bob Monsour rmonsour@earthlink.net Date: Mon, 04 Nov 1996 10:28:14 -0800 To: Karl Fox <karl@ascend.com> From: Bob Monsour <rmonsour@earthlink.net> Subject: Re: proposed IPSEC changes/extensions Cc: Stephen Kent <kent@bbn.com>, Hilarie Orman <ho@earth.hpc.org>, ipsec@TIS.COM Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: ipsec-approval@neptune.tis.com Precedence: bulk Message-ID: <9611041338.aa03372@neptune.TIS.COM> At 04:53 PM 11/1/96 -0500, Karl Fox wrote: >Does the ESP header itself have to deal with compression? Wouldn't it >be better to encrypt the compression headers along with the compressed >data? In our draft (draft-sabin-esp-des3-lzs-md5-00.txt), all of the compression-specific fields are encrypted. We would suggest that regardless of the method of documenting the compression fields (as part of ESP), it should not result in those fields being unencrypted. While the transforms will wind up being documented separately and accommodated within the ESP definition, the bytes of the data stream should be no different from the case where they are documented together. Bob Monsour rmonsour@earthlink.net Date: Mon, 04 Nov 1996 10:41:05 -0800 To: Stephen Kent <kent@bbn.com> From: Bob Monsour <rmonsour@earthlink.net> Subject: Re: proposed IPSEC changes/extensions Cc: Hilarie Orman <ho@earth.hpc.org>, ipsec@TIS.COM Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: ipsec-approval@neptune.tis.com Precedence: bulk Message-ID: <9611041357.aa05278@neptune.TIS.COM> At 02:01 PM 11/1/96 -0500, Stephen Kent wrote: >Since the addition of IP layer encryption >strongly motivates the use of compression (at least over dialup links), I >think it is not unreasonable to incorporate the compression facility as >part of an IPSEC implementation. Steve, this goes way beyond dial-up links. The effective use of compression on T1 links saves companies thousands of dollars per month. >The resulting protocol could still be an >independent module, to facilitate reuse in other contexts, so I'm not so >fond of closely tying the compression to any other IPSEC processing, as has >been suggested. That is correct. There is no need to intimately tie the processing together. Compression can be defined in such a way to make it a straightforward IPSec implementation option (one that would be negotiated and be specified as an SA attribute). > This leaves the question of whether ESP should have an optional set >of fields for compression, or if a separate header should be used. While a >separate header is cleaner, and I ma a supported of the "do it right the >first time" approach, I know a lot of folks are anxious to have IPSEC >deployed, so I can appreciate the motivation for making this another >optional part of ESP. I could go either way on this, but my feeling is that it is more natural to include support for compression within ESP itself as it is best employed in the context of encrypted packets. As a separate header, while it is perhaps cleaner, its use only really makes sense when encrypting since in the absence of encryption, compression will be performed at the PPP level. Bob Monsour rmonsour@earthlink.net Date: Mon, 04 Nov 1996 10:49:00 -0800 To: Steven Bellovin <smb@research.att.com> From: Bob Monsour <rmonsour@earthlink.net> Subject: Re: proposed IPSEC changes/extensions Cc: Hilarie Orman <ho@earth.hpc.org>, kent@bbn.com, ipsec@TIS.COM Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: ipsec-approval@neptune.tis.com Precedence: bulk Message-ID: <9611041359.aa05438@neptune.TIS.COM> At 08:44 PM 11/1/96 -0500, Steven Bellovin wrote: >I'm much less sanguine that we know how to do compression. We don't >have a spec (or rather, if we do have one, I couldn't find it; the >best I found was draft-thayer-seccomp-00.txt, and it referenced a >BoF for technical details), and there are some obvious technical >details in implementing compression over a lossy medium such as IP. Steve, see the following: Title : Combined 3DES-CBC, LZS Compression, HMAC, and Replay Prevention ESP Transform Author(s) : M. Sabin, R. Monsour Filename : draft-sabin-esp-des3-lzs-md5-00.txt Pages : 18 Date : 10/23/1996 This document proposes the "3DES-CBC-LZS-HMAC-Replay" security transform for the IP Encapsulating Security Payload (ESP). The proposed transform combines triple-DES encryption, LZS compression, HMAC authentication, and replay prevention into a single packet format. The transform is compatible with implementations that do not support compression and with implementations that support only single-DES encryption. Compression is performed prior to encryption, which has the side benefit of reducing the amount of data that must be encrypted. This document is based on the IPsec Working Group's proposed "Combined DES-CBC, HMAC, and Replay Prevention Security Transform," cited later in this document. >My estimate is that it will take about a year before we have a clean >spec for compression, independent of the standards process. I don't >want to wait until then to start deploying IPSEC. Nor am I convinced >that we know what fields to add now to the ESP header, to leave room >for compression. I disagree. Compression has been widely deployed at the data link (PPP) layer, and although that is a connection-oriented mechanism, there is certainly no black magic in terms of what is needed to deal with it. In addition to the two fields which Mike Sabin described in an earlier email (excerpted below), you would need to add one additional field to indicate the "flavor" of compression to be employed. The reason that this was no included in our draft was that the draft was LZS compression-specific. On Tuesday, October 29, 1996, Mike Sabin wrote: >Compression is greatly helped by including a field that controls two >functions: (1) whether or not the contents of the packet are compressed; >and (2) whether or not the compression state was reset prior to this packet. >Here is why: > >1) Compressing a packet sometimes actually expands its contents. This is >most common with short packets. When expansion occurs, it is better to send >the uncompressed version of the packet. This requires each packet to have a >bit that identifies the packet as compressed or not. > >2) Compression is stateful, which means that the transmitter and receiver >can get out of sync if packets are missed. To deal with this, the >transmitter frequently resets its compression state to a known starting >value, allowing an out-of-sync receiver to resync. A convenient way to >accommodate this is to include a bit in each packet that indicates whether >or not the compression state was reset prior to compressing this packet. > I hope this addresses your concerns. Bob Monsour rmonsour@earthlink.net Date: Mon, 04 Nov 1996 10:56:17 -0800 To: Stephen Kent <kent@bbn.com> From: Bob Monsour <rmonsour@earthlink.net> Subject: Re: proposed IPSEC changes/extensions Cc: ipsec@TIS.COM Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: ipsec-approval@neptune.tis.com Precedence: bulk Message-ID: <9611041400.aa05549@neptune.TIS.COM> At 10:43 AM 11/4/96 -0500, Stephen Kent wrote: > I think the concensus is that we should NOT include compression in >ESP, for a bariety of reasons. So, the revised ESP document will not >include ANY hooks for compression, reserved fields, etc. Note, however, >that we are moving away from the notion of transforms as bundled sets of >algorithms described in a single document. Instead, we are defining the >algorithms separately, and the notion of a transform will appear only in a >document that describes the combinations of algorithms that are negotiated >during SA establishment. It will cite these algorithms by reference to >appropriate RFCs, but wil not provide processing descriptions, etc. Thus I >do not see how to include compression into ESP processing at some later >time. If we keep it as a separate protocol, that's fine, but don't count >on some more optimized version that is tightly integrated into ESP. Steve, with all due respect, I don't believe that the arguments posed to date imply concensus against the inclusion of compression in ESP. I was out of town most of last week and was not in email contact. This morning I caught up and provided answers to all of the posted objections. I think it's too soon to dismiss this. I would like to hear from any of the list members of the user community or from others who are either contemplating the use of compression or see the value in having a standard method for combining the two functions wihtin the context of ESP. Comments? Bob Monsour rmonsour@earthlink.net
- proposed IPSEC changes/extensions Stephen Kent
- Re: proposed IPSEC changes/extensions David Wagner
- Re: proposed IPSEC changes/extensions Ran Atkinson
- Re: proposed IPSEC changes/extensions Hilarie Orman
- Re: proposed IPSEC changes/extensions pau
- Re: proposed IPSEC changes/extensions Michael Sabin
- Re: proposed IPSEC changes/extensions Stephen Kent
- Re: proposed IPSEC changes/extensions pau
- Re: proposed IPSEC changes/extensions Bill Sommerfeld
- Re: proposed IPSEC changes/extensions pau
- Re: proposed IPSEC changes/extensions Santeri Paavolainen
- Re: proposed IPSEC changes/extensions Rodney Thayer
- Re: proposed IPSEC changes/extensions Santeri Paavolainen
- Re: proposed IPSEC changes/extensions Stephen Kent
- Re: proposed IPSEC changes/extensions David Wagner
- Re: proposed IPSEC changes/extensions Steven Bellovin
- Re: proposed IPSEC changes/extensions Michael Sabin
- Re: proposed IPSEC changes/extensions John Gilmore