Re: [IPsec] I-D Action: draft-ietf-ipsecme-ike-tcp-01.txt
Paul Wouters <paul@nohats.ca> Fri, 14 December 2012 06:04 UTC
Return-Path: <paul@nohats.ca>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 83EC721F888E for <ipsec@ietfa.amsl.com>; Thu, 13 Dec 2012 22:04:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id odWBxZqLDaJH for <ipsec@ietfa.amsl.com>; Thu, 13 Dec 2012 22:04:36 -0800 (PST)
Received: from bofh.nohats.ca (bofh.nohats.ca [76.10.157.69]) by ietfa.amsl.com (Postfix) with ESMTP id 4401221F8882 for <ipsec@ietf.org>; Thu, 13 Dec 2012 22:04:35 -0800 (PST)
Received: by bofh.nohats.ca (Postfix, from userid 500) id A4B4B829B2; Fri, 14 Dec 2012 01:03:30 -0500 (EST)
Received: from localhost (localhost [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id 97DEC829A3; Fri, 14 Dec 2012 01:03:30 -0500 (EST)
Date: Fri, 14 Dec 2012 01:03:30 -0500
From: Paul Wouters <paul@nohats.ca>
To: Valery Smyslov <svanru@gmail.com>
In-Reply-To: <B1F8AE12E3604526980FA756C8F2DB09@buildpc>
Message-ID: <alpine.LFD.2.02.1212140053410.12672@bofh.nohats.ca>
References: <20121203223404.5441.71025.idtracker@ietfa.amsl.com> <E7FA5DBC7DB747779E6E6D73460A6615@buildpc> <4613980CFC78314ABFD7F85CC30277210EDFD9D0@IL-EX10.ad.checkpoint.com> <B1F8AE12E3604526980FA756C8F2DB09@buildpc>
User-Agent: Alpine 2.02 (LFD 1266 2009-07-14)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"; format="flowed"
Cc: ipsec@ietf.org, Yoav Nir <ynir@checkpoint.com>
Subject: Re: [IPsec] I-D Action: draft-ietf-ipsecme-ike-tcp-01.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Dec 2012 06:04:37 -0000
On Fri, 14 Dec 2012, Valery Smyslov wrote: >> Thinking it over, I kind of regret adding the port field to the >> TCP_SUPPORTED notification. >> We don't have any mechanism for alternate UDP ports. Yes, UDP has cheap >> liveness checks >> to keep the mapping in the NAT so that requests can be initiated to the >> original initiator, while TCP does not. >> >> But your points are well taken. Leaving the advertised TCP port to >> configuration or auto-discovery is error >> prone and adds unnecessary complications to the protocol. >> >> I propose that: >> 1. We remove the port from the Notify >> 2. All connections will be done to port 500. >> 3. We warn against trying to use TCP to a peer behind NAT That's too bad, but I agree it added a lot of complexity. What is the blocking rate for TCP 500 in the wild? And does anyone know why Cisco moved to port 10000? A higher port does seem to have a better chance at not being blocked. > Fully agree. And in this case please add the following to the list: > 4. We remove TCP_SUPPORTED notification from Initiator's message > (as it becomes redundant for most use cases). So if the responder falls back to TCP, and later becomes the initiator, should it assume TCP 500 is available, or do we go through another round of udp fail to tcp? As implementor, I see no issue remembering TCP is supported as longe as we have a parent SA. We don't need the TCP_SUPPORTED notification in the original initiator for that. But firewall rules might not be symmetric, and an outgoing TCP might work while an incoming TCP is blocked. But I guess if UDP isn't working well, there is not much choice left but try TCP. Paul
- [IPsec] I-D Action: draft-ietf-ipsecme-ike-tcp-01… internet-drafts
- Re: [IPsec] I-D Action: draft-ietf-ipsecme-ike-tc… Valery Smyslov
- Re: [IPsec] I-D Action: draft-ietf-ipsecme-ike-tc… Yoav Nir
- Re: [IPsec] I-D Action: draft-ietf-ipsecme-ike-tc… Paul Hoffman
- Re: [IPsec] I-D Action: draft-ietf-ipsecme-ike-tc… Valery Smyslov
- Re: [IPsec] I-D Action: draft-ietf-ipsecme-ike-tc… Paul Wouters
- [IPsec] Error in RFC6290 Valery Smyslov
- Re: [IPsec] Error in RFC6290 Yoav Nir
- Re: [IPsec] Error in RFC6290 Yaron Sheffer
- Re: [IPsec] Error in RFC6290 Valery Smyslov
- Re: [IPsec] Error in RFC6290 Yoav Nir