Re: [v6ops] [Technical Errata Reported] RFC4966 (3142)

Fred Baker <fred@cisco.com> Wed, 29 February 2012 20:39 UTC

Return-Path: <fred@cisco.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C324321E807A for <v6ops@ietfa.amsl.com>; Wed, 29 Feb 2012 12:39:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -108.57
X-Spam-Level:
X-Spam-Status: No, score=-108.57 tagged_above=-999 required=5 tests=[AWL=2.029, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rGx9-87ki0AV for <v6ops@ietfa.amsl.com>; Wed, 29 Feb 2012 12:39:06 -0800 (PST)
Received: from mtv-iport-4.cisco.com (mtv-iport-4.cisco.com [173.36.130.15]) by ietfa.amsl.com (Postfix) with ESMTP id CA96721E803B for <v6ops@ietf.org>; Wed, 29 Feb 2012 12:39:05 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=fred@cisco.com; l=2907; q=dns/txt; s=iport; t=1330547945; x=1331757545; h=subject:mime-version:from:in-reply-to:date:cc:message-id: references:to:content-transfer-encoding; bh=KvslsZtHzOIuUPeZQtCN6nGpDdVvO+tTHnWupt+kGJg=; b=BbwaqgYxPKn6gxhxtLgjSuuqTx2FsG5iTvsQ5kqgTp+iJScVGiRotG8P xu9FNZIwhtsqnfMdgQjD7FuLpZyAN+7IeofAxxhurRCxG6X2afD84WyM7 j3eOnRWaqZKnHJkFCFTU5xscJU0FPOAS5B9A8jLR/8fZ6JKmWbwLbOL6e 8=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: Av0EACWMTk+rRDoI/2dsb2JhbAAqGrNggQeBegEBAQMBEgEnLRIQC0ZXBhMih2IEDCmaFwGfHY0EGgELAwIIAgoBBgsCBgcOBwEKCQKFCkYFDggQgkpjBIhNjHKFX40hXg
X-IronPort-AV: E=Sophos;i="4.73,504,1325462400"; d="scan'208";a="33336603"
Received: from mtv-core-3.cisco.com ([171.68.58.8]) by mtv-iport-4.cisco.com with ESMTP; 29 Feb 2012 20:39:05 +0000
Received: from Freds-Computer.local (tky-vpn-client-231-196.cisco.com [10.70.231.196]) by mtv-core-3.cisco.com (8.14.3/8.14.3) with ESMTP id q1TKd3gW018840; Wed, 29 Feb 2012 20:39:04 GMT
Received: from [127.0.0.1] by Freds-Computer.local (PGP Universal service); Thu, 01 Mar 2012 05:39:05 +0900
X-PGP-Universal: processed; by Freds-Computer.local on Thu, 01 Mar 2012 05:39:05 +0900
Mime-Version: 1.0 (Apple Message framework v1084)
From: Fred Baker <fred@cisco.com>
In-Reply-To: <20120229194253.0980972E042@rfc-editor.org>
Date: Thu, 01 Mar 2012 05:38:43 +0900
Message-Id: <C92E3A88-7818-434F-BDE5-012391B87F26@cisco.com>
References: <20120229194253.0980972E042@rfc-editor.org>
To: RFC Errata System <rfc-editor@rfc-editor.org>
X-Mailer: Apple Mail (2.1084)
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Cc: v6ops v6ops WG <v6ops@ietf.org>, david.black@emc.com, Dan Romascanu <dromasca@avaya.com>, ietf@energizeurnet.com
Subject: Re: [v6ops] [Technical Errata Reported] RFC4966 (3142)
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Feb 2012 20:39:08 -0000

I have no objection to the erratum. I do wonder about how useful it is; we don't plan to update RFC 4966 any time soon.

On Mar 1, 2012, at 4:42 AM, RFC Errata System wrote:

> 
> The following errata report has been submitted for RFC4966,
> "Reasons to Move the Network Address Translator - Protocol Translator (NAT-PT) to Historic Status".
> 
> --------------------------------------
> You may review the report below and at:
> http://www.rfc-editor.org/errata_search.php?rfc=4966&eid=3142
> 
> --------------------------------------
> Type: Technical
> Reported by: David L. Black <david.black@emc.com>
> 
> Section: 2.1
> 
> Original Text
> -------------
> Unless UDP encapsulation is used for IPsec [RFC3498], traffic using
> 
> IPsec AH (Authentication Header), in transport and tunnel mode, and
> 
> IPsec ESP (Encapsulating Security Payload), in transport mode, is
> 
> unable to be carried through NAT-PT without terminating the security
> 
> associations on the NAT-PT, due to their usage of cryptographic
> 
> integrity protection.
> 
> Corrected Text
> --------------
> IPsec traffic using AH (Authentication Header) [RFC4302] in both
> 
> transport and tunnel modes cannot be carried through NAT-PT without
> 
> terminating the security associations on the NAT-PT, due to the
> 
> inclusion of IP header fields in the scope of AH's cryptographic
> 
> integrity protection [RFC3715].  In addition, IPsec traffic using
> 
> ESP (Encapsulating Security Payload) [RFC4303] in transport mode
> 
> generally uses UDP encapsulation [RFC3948] for NAT traversal
> 
> (including NAT-PT traversal) in order to avoid the problems
> 
> described in [RFC3715].
> 
> 
> 
> Notes
> -----
> This RFC4966 text was copied into draft-ietf-behave-64-analysis-06.
> 
> Gen-ART review of that draft found that the statement was incorrect
> 
> for ESP.  The correct explanations of the problems (in great detail)
> 
> can be found in RFC 3715.
> 
> Instructions:
> -------------
> This errata is currently posted as "Reported". If necessary, please
> use "Reply All" to discuss whether it should be verified or
> rejected. When a decision is reached, the verifying party (IESG)
> can log in to change the status and edit the report, if necessary. 
> 
> --------------------------------------
> RFC4966 (draft-ietf-v6ops-natpt-to-historic-00)
> --------------------------------------
> Title               : Reasons to Move the Network Address Translator - Protocol Translator (NAT-PT) to Historic Status
> Publication Date    : July 2007
> Author(s)           : C. Aoun, E. Davies
> Category            : INFORMATIONAL
> Source              : IPv6 Operations
> Area                : Operations and Management
> Stream              : IETF
> Verifying Party     : IESG