Re: [IPsec] NIST's Guidelines for secure deployment of IPv6

Venkatesh Sriram <vnktshsriram@gmail.com> Wed, 04 January 2012 15:42 UTC

Return-Path: <vnktshsriram@gmail.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 95AE821F871B for <ipsec@ietfa.amsl.com>; Wed, 4 Jan 2012 07:42:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level:
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5VVO5CXARnCB for <ipsec@ietfa.amsl.com>; Wed, 4 Jan 2012 07:42:11 -0800 (PST)
Received: from mail-pz0-f44.google.com (mail-pz0-f44.google.com [209.85.210.44]) by ietfa.amsl.com (Postfix) with ESMTP id B5ED521F870A for <ipsec@ietf.org>; Wed, 4 Jan 2012 07:42:11 -0800 (PST)
Received: by dajz8 with SMTP id z8so16409599daj.31 for <ipsec@ietf.org>; Wed, 04 Jan 2012 07:42:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=iworwdoyVu5YcyuI57p6adzqVfdD0A4gRzBinUjTOt4=; b=G6KSBziMLRjiaV1kA9lILG3UleKcqI50B0bsnIFDfZNnIOfItC7gAh85/sh74/RZtZ M5PVc3z0pSSQ4kHpejqwi7Q+/r9OUgbQJj2cbO93p2E3c7ItnbLD06l8zGkwIjhLlh1w zK9LZ+Yo6czwaxeWiDhl1mszfnY6+dj5HnooY=
MIME-Version: 1.0
Received: by 10.68.72.6 with SMTP id z6mr145000928pbu.73.1325691729660; Wed, 04 Jan 2012 07:42:09 -0800 (PST)
Received: by 10.68.17.193 with HTTP; Wed, 4 Jan 2012 07:42:09 -0800 (PST)
In-Reply-To: <7C362EEF9C7896468B36C9B79200D8350D028A2AE1@INBANSXCHMBSA1.in.alcatel-lucent.com>
References: <7C362EEF9C7896468B36C9B79200D8350D028A2AE1@INBANSXCHMBSA1.in.alcatel-lucent.com>
Date: Wed, 4 Jan 2012 21:12:09 +0530
Message-ID: <CAObD46vQP9OzZLqOLy24qkUb60EWTT+MkGisB0PivukpFe=1og@mail.gmail.com>
From: Venkatesh Sriram <vnktshsriram@gmail.com>
To: "Bhatia, Manav (Manav)" <manav.bhatia@alcatel-lucent.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: IPsecme WG <ipsec@ietf.org>
Subject: Re: [IPsec] NIST's Guidelines for secure deployment of IPv6
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Jan 2012 15:42:12 -0000

Another document from NIST - Profile for IPv6 in the US Government
[1], lists AH as optional and ESP as mandatory.

It however says that if devices want to differentiate ESP NULL with
ESP encrypted traffic then they must use AH till the IPSecME WG comes
up with a mature standard that can easily do this. It says that if it
produces a mature RFC then the profile will be updated to recommend
its use. The version i have with me was published prior to WESP's
publication.

http://www.antd.nist.gov/usgv6/usgv6-v1.pdf

Sriram

[1] This document is meant to assist Federal agencies in formulating
plans for the acquisition of IPv6 technologies.

On Wed, Jan 4, 2012 at 7:42 PM, Bhatia, Manav (Manav)
<manav.bhatia@alcatel-lucent.com>; wrote:
> NIST has published the "Guidelines for secure deployment of IPv6" and it unequivocally says that AH has fallen out for ESP-NULL.
>
> One can go through the document in detail. I have not gone through the entire document but here are some excerpts from that document:
>
> (1) It says the following for OSPFv3:
>
> "With routing protocols, routing integrity is usually a greater concern than confidentiality. The ESP
> parameter NULL indicating no encryption is generally regarded to be an acceptable choice for OSPF
> security."
>
> (2) 4.2.4 Unresolved Aspects of IPv6 Multicast
>
> "The security recommendations for PIM call for using IPsec AH, even for unicast messages.  Where IPsec
> is used with IPv4, AH has generally fallen out of use in favor of ESP, with NULL encryption when
> authentication-only is desired.  Thus the IPsec standard (RFC 4301) no longer requires AH, and many
> implementations omit it. See Section 5.3.6 for additional discussion of this topic."
>
> (3) 5.3.1 Specification Overview
>
> "Two security protocols: Authentication Header (AH) and Encapsulating Security
> Payload (ESP).  AH can provide integrity and replay protection for packet headers and data,
> but it cannot encrypt them.  ESP can provide encryption, integrity, and replay protection for
> packets, but it cannot protect the outermost IP header, as AH can.  This protection is not
> needed in most cases.  Accordingly, ESP is used much more frequently than AH because of its
> encryption capabilities, as well as other operational advantages.  The latest IPsec specification
> states that implementations MAY implement AH, and many choose not to.  For a VPN, which
> requires confidential communications, ESP is the natural choice."
>
> And the below is the most interesting:
>
> (4) 5.3.6 Unknown Aspects
>
> "A debate exists over whether to use AH or ESP with NULL encryption for IPsec packets requiring
> integrity protection but not confidentiality.  The standards themselves do not answer the question: IPv6
> standards tend to recommend or require AH, whereas IPsec standards have downgraded AH from MUST
> implement to MAY implement.  OSPFv3 originally specified AH, but this has been changed to ESPNULL.
> Some implementations only provide ESP.  AH has not been widely deployed.  (The common
> IPv4 applications of IPsec-VPNs and secure remote access-usually provide confidentiality, so this
> question does not arise.)  AH may also require more processing steps to compute or verify the integrity
> check value.  On the other hand, one of the main arguments in favor of AH is that it makes it easier for
> devices such as packet filtering routers, firewalls, and intrusion detection systems to recognize plaintext
> and examine packets (because ESP-NULL transmits plaintext but gives no visible indication that the
> payload is unencrypted).  As far as the cryptographic protection provided by AH versus ESP, it is difficult
> to discern any tangible difference when IPsec is used as intended.  In some cases, AH may protect certain
> vulnerable parts of the header or extension headers, but these cases are rare, and in these few cases,
> ESPNULL can achieve the same effect by being run in tunnel mode."
>
> (5) 5.4.1 Using IPsec to Secure Autoconfiguration and ND
>
> "AH was downgraded to MAY in RFC 4301 and is not included in many implementations."
>
> Cheers, Manav
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec