Re: [secdir] Review of draft-ietf-ipsecme-traffic-visibility-11

"Bhatia, Manav (Manav)" <manav.bhatia@alcatel-lucent.com> Fri, 11 December 2009 04:53 UTC

Return-Path: <manav.bhatia@alcatel-lucent.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0DA803A6A1E for <secdir@core3.amsl.com>; Thu, 10 Dec 2009 20:53:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.036
X-Spam-Level:
X-Spam-Status: No, score=-2.036 tagged_above=-999 required=5 tests=[AWL=0.563, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LvEdwlzvuIyi for <secdir@core3.amsl.com>; Thu, 10 Dec 2009 20:53:46 -0800 (PST)
Received: from ihemail2.lucent.com (ihemail2.lucent.com [135.245.0.35]) by core3.amsl.com (Postfix) with ESMTP id E87163A6A20 for <secdir@ietf.org>; Thu, 10 Dec 2009 20:53:45 -0800 (PST)
Received: from inbansmailrelay1.in.alcatel-lucent.com (h135-250-11-31.lucent.com [135.250.11.31]) by ihemail2.lucent.com (8.13.8/IER-o) with ESMTP id nBB4rRoT026749 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Thu, 10 Dec 2009 22:53:30 -0600 (CST)
Received: from INBANSXCHHUB01.in.alcatel-lucent.com (inbansxchhub01.in.alcatel-lucent.com [135.250.12.32]) by inbansmailrelay1.in.alcatel-lucent.com (8.14.3/8.14.3/ICT) with ESMTP id nBB4rK6O008394 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Fri, 11 Dec 2009 10:23:26 +0530
Received: from INBANSXCHMBSA1.in.alcatel-lucent.com ([135.250.12.56]) by INBANSXCHHUB01.in.alcatel-lucent.com ([135.250.12.32]) with mapi; Fri, 11 Dec 2009 10:22:54 +0530
From: "Bhatia, Manav (Manav)" <manav.bhatia@alcatel-lucent.com>
To: Gabriel Montenegro <gmonte@microsoft.com>, Sean Turner <turners@ieca.com>, secdir <secdir@ietf.org>, "draft-ietf-ipsecme-traffic-visibility.all@tools.ietf.org" <draft-ietf-ipsecme-traffic-visibility.all@tools.ietf.org>
Date: Fri, 11 Dec 2009 10:22:25 +0530
Thread-Topic: Review of draft-ietf-ipsecme-traffic-visibility-11
Thread-Index: AQHKeGbnOkwDTlf2mUWHcb7VNERg/pFc6IowgAJaWkA=
Message-ID: <7C362EEF9C7896468B36C9B79200D8350AB31C58FE@INBANSXCHMBSA1.in.alcatel-lucent.com>
References: <4B1EE71E.1040704@ieca.com> <17CBED0797974641B6FF531FCB74E0931B5A9376@TK5EX14MBXW652.wingroup.windeploy.ntdev.microsoft.com>
In-Reply-To: <17CBED0797974641B6FF531FCB74E0931B5A9376@TK5EX14MBXW652.wingroup.windeploy.ntdev.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.35
X-Scanned-By: MIMEDefang 2.64 on 135.250.11.31
X-Mailman-Approved-At: Fri, 11 Dec 2009 08:10:12 -0800
Subject: Re: [secdir] Review of draft-ietf-ipsecme-traffic-visibility-11
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Dec 2009 04:53:47 -0000

Hi Sean,

In addition to what Gabriel said, the other issue with AH is that the work involved in taking out the fields that are immutable, hashing the packet and sticking those immutable fields back can be quite challenging. One needs to know the contents surrounding the IP header to calculate the AH field which violates the layering and raises interesting challenges for HW based Ipsec implementations.

Almost all IETF standards (e.g. RFC 4552) that explicitly define how IPSec needs to be used for authentication state ESP-NULL as a MUST and AH as a MAY. I don't think there is any RFC that states AH as MUST. This could also be because RFC 4301 deprecated the use of AH from a MUST to a MAY. It is for these reasons that ESP-NULL is widely implemented and I know of at least two major router vendors that don't even implement the AH standard.

AH has its own use and is really not equivalent to ESP-NULL. If there are intermediaries that are changing the IP addresses then ESP-NULL will not detect the IP address spoof and AH is the only standard that can detect this (i.e. if you care about this). OTOH, if you know that your IP addresses can change, and you want to verify the integrity of the payload then ESP-NULL is the only protocol that can be used!

Cheers, Manav

> -----Original Message-----
> From: Gabriel Montenegro [mailto:gmonte@microsoft.com] 
> Sent: Wednesday, December 09, 2009 10.10 PM
> To: Sean Turner; secdir; 
> draft-ietf-ipsecme-traffic-visibility.all@tools.ietf.org
> Subject: RE: Review of draft-ietf-ipsecme-traffic-visibility-11
> 
> Hi Sean, thanks for the review.
> 
> As you noted, the WG decided not to use AH as NATs are 
> unavoidable and a fact of life. Not sure if there were many 
> other reasons, but this one seems to be a show-stopper if one 
> wants to deploy this in any real scenario. 
> 
> > -----Original Message-----
> > From: Sean Turner [mailto:turners@ieca.com]
> > Sent: Tuesday, 08 December, 2009 3:54 PM
> > To: secdir; draft-ietf-ipsecme-traffic-visibility.all@tools.ietf.org
> > Subject: Review of draft-ietf-ipsecme-traffic-visibility-11
> > 
> > I have reviewed this document as part of the security directorate's
> > ongoing effort to review all IETF documents being processed 
> by the IESG.
> > These comments were written primarily for the benefit of 
> the security area
> > directors. Document editors and WG chairs should treat 
> these comments just
> > like any other last call comments.
> > 
> > Document Abstract:
> > 
> > This document describes the Wrapped Encapsulating Security Payload
> > (WESP) protocol, which builds on the Encapsulating Security Payload
> > (ESP) [RFC4303], and is designed to allow intermediate 
> devices to (1)
> > ascertain if data confidentiality is being employed within 
> ESP and if not,
> > (2) inspect the IPsec packets for network monitoring and 
> access control
> > functions.
> > 
> > I don't have any comments on the technical contents of the ID.
> > 
> > But, I do have a comment w.r.t. the approach.*  It seems to 
> me that what
> > you're looking for is an indication early on that the 
> coming packets are
> > encrypted or not.  Don't we already have that with the 
> 50/51 value in the
> > protocol header (IPv4, IPv6, or Extension) immediately preceding the
> > ESP/AH header.  Why don't we use that as the indication, 
> prohibit those
> > NULL encryption algorithms, and then we're done?  We don't 
> have to worry
> > about implementing this protocol, the heuristics algorithm 
> in the other I-
> > D, and we don't have to complicate the adoption of ESP/AH?
> > 
> > spt
> > 
> > * The only rationale I saw was in the 3rd paragraph of the 
> introduction
> > that says AH doesn't work in NAT environments.  Is that 
> really the entire
> > reason?  I thought we were trying to kill NATS?
> 
>