Re: [IPsec] IPsecME virtual meeting minutes, and way forward with fragmentation

Brian Weis <> Thu, 16 May 2013 23:55 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 7C3D011E80A3 for <>; Thu, 16 May 2013 16:55:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -110.599
X-Spam-Status: No, score=-110.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id ij4Sgg0mgdVh for <>; Thu, 16 May 2013 16:55:14 -0700 (PDT)
Received: from ( []) by (Postfix) with ESMTP id 909B311E80E1 for <>; Thu, 16 May 2013 16:55:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;;; l=1338; q=dns/txt; s=iport; t=1368748511; x=1369958111; h=mime-version:subject:from:in-reply-to:date:cc: content-transfer-encoding:message-id:references:to; bh=SfPKvxdF/ORk97kl7927ekFqUjd8JlAaBWBqSFhofQU=; b=gkvIjBOX6dfZd5kyNe7ICoIH6Ck9sf0voO4DdScn9uPcOzStfdFl1xy1 2NqXGgV98mzAOtzvakc4xIX28GPkTTlZLEbusHLPMiW/ht5QNABQzXjv5 +JUphb6zSpONhYqaMWhRX8vfVLaGc2r2Bog6NcKm1o011KZfbeU6cjmzW w=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AhAFAHJxlVGrRDoG/2dsb2JhbABbgwjCBnsWdIIfAQEBAwE6NAsFCwtGITYGExuHXwMJBQGzXQ2IXoxIgiQzB4J0YQOJH4wzgWaMHYUjgzA
X-IronPort-AV: E=Sophos;i="4.87,687,1363132800"; d="scan'208";a="81337762"
Received: from ([]) by with ESMTP; 16 May 2013 23:54:52 +0000
Received: from ( []) by (8.14.5/8.14.5) with ESMTP id r4GNsp3u014964 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Thu, 16 May 2013 23:54:51 GMT
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 6.3 \(1503\))
From: Brian Weis <>
In-Reply-To: <>
Date: Thu, 16 May 2013 16:54:51 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <>
References: <> <>
To: Yaron Sheffer <>
X-Mailer: Apple Mail (2.1503)
Cc: IPsecme WG <>
Subject: Re: [IPsec] IPsecME virtual meeting minutes, and way forward with fragmentation
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion of IPsec protocols <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Thu, 16 May 2013 23:55:19 -0000

On May 16, 2013, at 9:57 AM, Yaron Sheffer <> wrote:

> Hi,
> As promised, we just had a virtual interim meeting to discuss IKEv2 fragmentation. Please see the minutes below (thanks Paul!).
> Following up on this meeting, we would like to confirm the decision on the mailing list:
> - The group still thinks this is an important problem that needs an interoperable solution.
> - We would like to abandon the work on IKE-over-TCP.
> - And to work on IKEv2 protocol-level fragmentation, using draft-smyslov-ipsecme-ikev2-fragmentation as a starting point.
> Please send your approval, disapproval or comments to the list within a week (until May 23).

I approve.


> Yaron: do we want to stay with the current TCP-based solution?
> 	Brian: might be running on sensors that don't have a TCP stack

Someone made this comment, but it wasn't me. 

I did mention that the current TCP-based solution has the advantage of only re-sending the missing TCP segment, whereas current and proposed UDP-based fragmentation solutions re-send all packet fragments. That could be valuable for a VPN gateway with many peers with a lossy network. But that doesn't seem enough of a justification to stay with the current TCP-based solution.