Hello Mohamed,

> I adopted in my local copy the text you proposed to describe the IPsec issue. 
> I can even shorten the
> text to something like "IPsec complications with NAT-PT (Section 2.1 of 
> [RFC4966])" but I prefer your
> text because it provides more RFC pointers.

Thank you for picking up the text.

It would be helpful for the Security Area to double-check it - I've cc:'d Sean 
Turner (SEC AD) in the hope that he or one of the IPsec experts in the Security 
Directorate can quickly check this 1-paragraph proposed text change, as in 
addition to this draft, I will need to file the result as errata against RFC 
4966.

OLD
   6.  Unless UDP encapsulation is used for IPsec [RFC3948], traffic
       using IPsec AH (Authentication Header), in transport and tunnel
       mode, and IPsec ESP (Encapsulating Security Payload), in
       transport mode, is unable to be carried through NAT-PT without
       terminating the security associations on the NAT-PT, due to their
       usage of cryptographic integrity protection (Section 4.5 of
       [RFC4966]).
NEW
   6.  IPsec traffic using AH (Authentication Header) [RFC4302] in
       both transport and tunnel modes cannot be carried through NAT-PT
       without terminating the security associations on the NAT-PT, due
       to the inclusion of IP header fields in the scope of AH's cryptographic
       integrity protection [RFC3715] (Section 2.1 of [RFC4966]).  In
       addition, IPsec traffic using ESP (Encapsulating Security Payload)
       [RFC4303] in transport mode generally uses UDP encapsulation [RFC3948]
       for NAT traversal (including NAT-PT traversal) in order to avoid the
       problems described in [RFC3715] (Section 2.1 of [RFC 4966]).
END

Thanks,
--David

> -----Original Message-----
> From: [email protected] [mailto:[email protected]]
> Sent: Wednesday, February 29, 2012 4:37 AM
> To: Black, David; [email protected]; [email protected]; [email protected]; 
> [email protected]
> Cc: [email protected]; [email protected]; [email protected]; 
> [email protected]
> Subject: RE: Gen-ART review of draft-ietf-behave-64-analysis-06
> 
> Dear David,
> 
> Thank you for the review.
> 
> I adopted in my local copy the text you proposed to describe the IPsec issue. 
> I can even shorten the
> text to something like "IPsec complications with NAT-PT (Section 2.1 of 
> [RFC4966])" but I prefer your
> text because it provides more RFC pointers.
> 
> Cheers,
> Med
> 
> > -----Message d'origine-----
> > De : [email protected] [mailto:[email protected]]
> > Envoyé : mardi 28 février 2012 17:01
> > À : [email protected]; [email protected]; BOUCADAIR Mohamed
> > OLNC/NAD/TIP; [email protected]; [email protected]
> > Cc : [email protected]; [email protected];
> > [email protected]; [email protected];
> > [email protected]
> > Objet : Gen-ART review of draft-ietf-behave-64-analysis-06
> >
> > I have been selected as the General Area Review Team
> > (Gen-ART) reviewer
> > for this draft (for background on Gen-ART, please see
> > http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).
> >
> > Please wait for direction from your document shepherd or
> > AD before posting a new version of the draft.
> >
> > Document: draft-ietf-behave-64-analysis-06
> > Reviewer: David L. Black
> > Review Date: February 28, 2012
> > IETF LC End Date: February 20, 2012
> > IESG Telechat Date: March 1, 2012
> >
> > Summary:
> >
> > This draft is on the right track but has open issues,
> > described in the review.
> >
> > Comments:
> >
> > This draft summarizes the improvements of stateful 64
> > techniques over the now-historic
> > NAT-PT techniques for communication between IPv4 and IPv6
> > networks.  The draft does a
> > nice job of summarizing the current situation in a fashion
> > that avoids the reader
> > having to go through the plethora of details in the cited
> > references.  The draft is
> > clearly written and reads well.
> >
> > There is one open issue that's almost a nit - unfortunately,
> > the IPsec discussion in
> > item 6 of Section 3.2 is wrong, even though it was copied
> > from RFC 4966 (FWIW, it's
> > wrong there, also):
> >
> >    6.  Unless UDP encapsulation is used for IPsec [RFC3948], traffic
> >        using IPsec AH (Authentication Header), in transport and tunnel
> >        mode, and IPsec ESP (Encapsulating Security Payload), in
> >        transport mode, is unable to be carried through NAT-PT without
> >        terminating the security associations on the NAT-PT,
> > due to their
> >        usage of cryptographic integrity protection (Section 4.5 of
> >        [RFC4966]).
> >
> > There are four problems with that explanation:
> >
> > (1) AH cannot be UDP-encapsulated.  RFC 3948 says:
> >
> >    Because the protection of the outer IP addresses in IPsec AH is
> >    inherently incompatible with NAT, the IPsec AH was left out of the
> >    scope of this protocol specification.
> >
> > (2) The reasons for use of UDP encapsulation with ESP do not
> > include ESP's
> > "usage of cryptographic integrity protection."  because ESP's
> > cryptographic
> > integrity protection does not include any IP header fields.
> > The actual reasons
> > are considerably more subtle and involved (e.g., traffic
> > selector issues and
> > NAT implementations that did not work correctly with IKE),
> > see RFC 3715.
> >
> > (3) Nit: The correct RFC 4966 reference is Section 2.1, not 4.5.
> >
> > (4) A number of additional references are needed, starting
> > with RFC 3715.
> >
> > Here's an attempt to propose a text change:
> >
> > OLD
> >    6.  Unless UDP encapsulation is used for IPsec [RFC3948], traffic
> >        using IPsec AH (Authentication Header), in transport and tunnel
> >        mode, and IPsec ESP (Encapsulating Security Payload), in
> >        transport mode, is unable to be carried through NAT-PT without
> >        terminating the security associations on the NAT-PT,
> > due to their
> >        usage of cryptographic integrity protection (Section 4.5 of
> >        [RFC4966]).
> > NEW
> >    6.  IPsec traffic using AH (Authentication Header) [RFC4302] in
> >        both transport and tunnel modes cannot be carried
> > through NAT-PT
> >        without terminating the security associations on the
> > NAT-PT, due
> >        to the inclusion of IP header fields in the scope of
> > AH's cryptographic
> >        integrity protection [RFC3715] (Section 2.1 of [RFC4966]).  In
> >        addition, IPsec traffic using ESP (Encapsulating
> > Security Payload)
> >        [RFC4303] in transport mode generally uses UDP
> > encapsulation [RFC3948]
> >        for NAT traversal (including NAT-PT traversal) in
> > order to avoid the
> >        problems described in [RFC3715] (Section 2.1 of [RFC 4966]).
> > END
> >
> > The Security Area should review the above proposed text change.
> >
> > idnits 2.12.13 noted that RFC 2766 was obsoleted by RFC 4966 - this is
> > fine, as RFC 2766 does need to be cited.
> >
> > Thanks,
> > --David
> > ----------------------------------------------------
> > David L. Black, Distinguished Engineer
> > EMC Corporation, 176 South St., Hopkinton, MA  01748
> > +1 (508) 293-7953             FAX: +1 (508) 293-7786
> > [email protected]        Mobile: +1 (978) 394-7754
> > ----------------------------------------------------
> >
> >
_______________________________________________
Gen-art mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to