Re: [IPsec] Avoiding Authentication Header (AH)

RJ Atkinson <rja.lists@gmail.com> Wed, 04 January 2012 11:39 UTC

Return-Path: <rja.lists@gmail.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AAE4E21F8735 for <ipsec@ietfa.amsl.com>; Wed, 4 Jan 2012 03:39:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.64
X-Spam-Level:
X-Spam-Status: No, score=-3.64 tagged_above=-999 required=5 tests=[AWL=-0.041, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gDHpRwEQu63M for <ipsec@ietfa.amsl.com>; Wed, 4 Jan 2012 03:39:43 -0800 (PST)
Received: from mail-qy0-f172.google.com (mail-qy0-f172.google.com [209.85.216.172]) by ietfa.amsl.com (Postfix) with ESMTP id 13D9521F8733 for <ipsec@ietf.org>; Wed, 4 Jan 2012 03:39:43 -0800 (PST)
Received: by qcsf15 with SMTP id f15so12272567qcs.31 for <ipsec@ietf.org>; Wed, 04 Jan 2012 03:39:42 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=content-type:mime-version:subject:from:in-reply-to:date :content-transfer-encoding:message-id:references:to:x-mailer; bh=N0JtrdDInxNX1cJtVXDzKanHFpJ5FYCuP/YdJPNqzeI=; b=jhNHSrrKyMW62s5i4CUEv63W3DZRzT4VoeUB0HJzr0bq8oQkadhEHu3gMR9TpJsbIX tBAeoBuQQCNKbbooe4Fnd51AzyhVjH3tpb77iRaaGLNJtqZTIR3R2sTAzw5GvyBtBPvl XwlikN8vUgi6+1PI+etXQM5WV/BX6OOfFnX4g=
Received: by 10.224.102.2 with SMTP id e2mr65876175qao.31.1325677182650; Wed, 04 Jan 2012 03:39:42 -0800 (PST)
Received: from [10.30.20.12] (pool-96-225-134-175.nrflva.fios.verizon.net. [96.225.134.175]) by mx.google.com with ESMTPS id r10sm106288780qaz.7.2012.01.04.03.39.41 (version=TLSv1/SSLv3 cipher=OTHER); Wed, 04 Jan 2012 03:39:41 -0800 (PST)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Apple Message framework v1251.1)
From: RJ Atkinson <rja.lists@gmail.com>
In-Reply-To: <CAK3OfOg0Gsxxf8T66XNVLHtR1Tk9yHFDGw96tr0UkEh6x5uYpQ@mail.gmail.com>
Date: Wed, 04 Jan 2012 06:39:43 -0500
Content-Transfer-Encoding: 7bit
Message-Id: <48CB2A9F-D59C-462F-8C7A-82127A217703@gmail.com>
References: <12533D04-6B3F-490F-935B-4F1FA612C938@gmail.com> <7C362EEF9C7896468B36C9B79200D8350D027BB46F@INBANSXCHMBSA1.in.alcatel-lucent.com> <F1B15794-3291-4E71-BE26-A3559F408B01@gmail.com> <7C362EEF9C7896468B36C9B79200D8350D027BB484@INBANSXCHMBSA1.in.alcatel-lucent.com> <23AFA108-5B72-4CB0-8498-6CC27FC79F96@gmail.com> <CAA1nO734gfXYJLeLU9iYxoArPZJ3Xo3MsXy0Rt9zgoTciBCZbQ@mail.gmail.com> <CAK3OfOg0Gsxxf8T66XNVLHtR1Tk9yHFDGw96tr0UkEh6x5uYpQ@mail.gmail.com>
To: IPsec ME WG List <ipsec@ietf.org>
X-Mailer: Apple Mail (2.1251.1)
Subject: Re: [IPsec] Avoiding Authentication Header (AH)
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Jan 2012 11:39:43 -0000

On 04  Jan 2012, at 00:49 , Nico Williams wrote:
> Advising (and updating said advice as circumstances change)
> use-IPsec protocol designers as to when to use ESP and/or
> AH is something we should do.  

This has already been done.  More than once.
For a start, the latest IPsec RFCs contain advice.  
There are also other RFCs with such advice, 
including a relatively recent BCP on use of IPsec.  

There is no evidence of any recent change either 
to the operational circumstances or to the available 
alternatives.  So no update is appropriate at this time.

> Deprecating AH seems like a nice idea, but if there's good
> reasons to still use it, then maybe not.

There are deployments now and have been deployments 
all along -- and those deployments don't have any
alternatives to AH.

> In 2012 the use of manually keyed unicast SAs with
> group shared keys is not exactly impressive (because not scalable).  

Actually, that assumption is not valid.  There are 
multiple approaches to scalability available now.  

An obvious example is to use a KDC to distribute keys.  
Another example is to use existing provisioning systems 
to provision keys.  ISPs have a wide range of provisioning 
systems, often locally developed.  Enterprise users vary 
-- larger enterprises often have provisioning systems; 
smaller enterprise users less often (although their scale 
is also smaller).  Many enterprise equipment vendors 
offer centralised management platforms that include
provisioning capability, often multi-vendor provisioning
capability.  There is also a standards-based approach
to configuration/provisioning -- using NetConf.  There
are even approaches that use RADIUS to distribute wrapped
keys.  

Yours,

Ran