Re: [IPsec] Update and WGLC request [Re: I-D Action: draft-ietf-ipsecme-iptfs-02.txt]

Christian Hopps <chopps@chopps.org> Wed, 14 October 2020 07:40 UTC

Return-Path: <chopps@chopps.org>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 330F73A13E8 for <ipsec@ietfa.amsl.com>; Wed, 14 Oct 2020 00:40:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M6o5ANHW3H4s for <ipsec@ietfa.amsl.com>; Wed, 14 Oct 2020 00:40:50 -0700 (PDT)
Received: from smtp.chopps.org (smtp.chopps.org [54.88.81.56]) by ietfa.amsl.com (Postfix) with ESMTP id A4CE73A13E4 for <ipsec@ietf.org>; Wed, 14 Oct 2020 00:40:50 -0700 (PDT)
Received: from stubbs.int.chopps.org (047-050-069-038.biz.spectrum.com [47.50.69.38]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by smtp.chopps.org (Postfix) with ESMTPSA id B7E1D61674; Wed, 14 Oct 2020 07:40:49 +0000 (UTC)
From: Christian Hopps <chopps@chopps.org>
Message-Id: <56F3A6E6-EDD6-46FA-8829-EC10FD9AD058@chopps.org>
Content-Type: multipart/signed; boundary="Apple-Mail=_89D667A0-016F-4173-9FAD-83D32513EF46"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.4\))
Date: Wed, 14 Oct 2020 03:40:48 -0400
In-Reply-To: <001701d6a1f7$76981240$63c836c0$@gmail.com>
Cc: Christian Hopps <chopps@chopps.org>, Tero Kivinen <kivinen@iki.fi>, Lou Berger <lberger@labn.net>, ipsec@ietf.org
To: Valery Smyslov <smyslov.ietf@gmail.com>
References: <160148315262.3746.2680691950315422865@ietfa.amsl.com> <27659521-C1B0-4F0E-A6CC-C6F4B8938FFE@chopps.org> <1ab401d6a131$ae279f30$0a76dd90$@gmail.com> <ab981da9-9735-b6a9-851d-736330748ce6@labn.net> <1b0b01d6a163$15ddcce0$419966a0$@gmail.com> <47f569bf-de43-3aa4-ad4f-5149b82b35f6@labn.net> <1b2401d6a16a$12110940$36331bc0$@gmail.com> <86bb0855-927d-defb-374c-d6f6be13eb50@labn.net> <24453.58544.114398.668064@fireball.acr.fi> <0b080379-48c0-b4ac-c213-f8cdfefc514a@labn.net> <24454.5506.450515.501200@fireball.acr.fi> <001701d6a1f7$76981240$63c836c0$@gmail.com>
X-Mailer: Apple Mail (2.3608.120.23.2.4)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/xuS_gyKS8NP9zYbhN6h8AyrucP4>
Subject: Re: [IPsec] Update and WGLC request [Re: I-D Action: draft-ietf-ipsecme-iptfs-02.txt]
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 Oct 2020 07:40:52 -0000

Indeed, this isn't about switching a pair of SAs to IPTFS in the middle of the tunnel operation. This is only about supporting the receipt of IPTFS as a payload in ESP.

Zero conf (or globally config enabled) receive support of IPTFS payloads is seen by some as a real value add. I'm not sure what the kerfuffle is all about. :)

Thanks,
Chris.

> On Oct 14, 2020, at 2:58 AM, Valery Smyslov <smyslov.ietf@gmail.com> wrote:
> 
> Hi Tero,
> 
>>> I'm not advocating ike vs ike-less, just trying to have a comprehensive
>>> solution.  One example ikeless usecase is captured by the YANG model in
>>> last call:
>>> https://tools.ietf.org/html/draft-ietf-i2nsf-sdn-ipsec-flow-protection-09
>> 
>> Which will require similar behavior from the IPsec part than IKE,
>> meaning you can't really change any parameters on the fly for existing
>> SAs. You can't change for example the ciphers of the existing SA, and
>> expect that to work.
> 
> In fact, unlike changing e.g. cipher on the fly, that is not possible,
> because the cipher used is not present in the ESP packet, so that you
> cannot distinguish two ESP packets with different ciphers, you can distinguish
> tunnel packets from IPTFS packets on receiving side
> (by analyzing Next Header), so technically the proposed
> switching is workable. That said, I fully agree with you
> that it is a very bad idea and must be prohibited,
> at least for traditional IPsec.
> 
> I care less about other use cases (I recall that authors wanted
> to use IPTFS not only for IPsec, but as more generic
> mechanism to pack several IP packets into one). So, I may leave
> with this option if it will be explicitly prohibited
> for traditional IPsec. IKE-less (l2nsf) use case is a corner case,
> I tend to agree with you that it should be prohibited
> for this case too.
> 
> Regards,
> Valery.
> 
>> My understanding for that is that ike-less will not change any
>> parameters of the existing SAs in the SAD, as that would definitely
>> break everything, but instead they will allocate new SPI, install new
>> SAD entry, and then remove the old SAD entry which causes the traffic
>> move to use the newly created SAD entry.
>> 
>> So for that use, there is no point of having a way to turn on IPTFS in
>> the middle of SA use time, exactly as there is no need to try to
>> change algorithms of the existing SAs. If you do that kind of things,
>> you just create new SA, and delete old one. I am not sure whether this
>> should be reflected on the draft-ietf-i2nsf-sdn-ipsec-flow-protection
>> somehow, i.e., indicating that most (if not all) of the items in the
>> sad-entry are write once type of things, i.e., you can write them
>> once, but you can't modify them once they have been set, and only way
>> to change them is to delete the whole sad-entry and recreate it with
>> new values (most likely doing it other way round, i.e., first create
>> new and delete old).
>> --
>> kivinen@iki.fi
>