On Nov 13, 2011, at 4:30 PM, Vilhelm Jutvik wrote:
> Dear all,
>
> I am writing this as I have a question that I've failed to clarify by
> other means.
>
> It is commonly stated that the ESP protocol covers all of the
> functionality afforded by AH (integrity and authentication) in
> addition to confidentiality, with the exception that AH also protects
> the parts of the IP header that are nonmutable in transit (the source
> and destination fields most notably). This is then used as leverage in
> the argument to justify the need of applying two SAs to a single
> traffic pattern (i.e. connection): "ESP for authentication, integrity
> and confidentiality. AH for protecting the source and IP address". It
> should be noted that this only applies to transport mode as the whole
> "tunneled" IP packet can be protected by ESP while in tunnel mode.
>
> However, RFC 4301 stipulates that after AH / ESP processing the
> addressing information of the packet must be successfully matched with
> the traffic pattern of the associated SAD entry. In my eyes, this
> would make it impossible for an attacker to alter (most importantly)
> the source address of a packet as it would be discarded.
>
> From page 62, RFC 4301:
>
> ...
> 4. Apply AH or ESP processing as specified, using the SAD entry
> selected in step 3a above. Then match the packet against the
> inbound selectors identified by the SAD entry to verify that the
> received packet is appropriate for the SA via which it was
> received.
> ...
>
> This, if true, would imply that all functionality offered by AH could
> be provided by ESP. Is this true? The only "loopholes" I could come up
> with is the case of extension headers in IPv6 which are not protected
> by ESP, or issues arising in conjunction with multicast.
>
> In any case, I would be very happy if someone could clarify this
> question for me.
>
The notion of discarding AH entirely has been discussed for many years.
I've long been in favor of it, though I can't find a copy of anything old I
had posted in my mail archives at the moment. The counter-argument
-- and again, it's been presented many times over many years -- is that
AH protects some IP options. That's useless in IPv4; the assertion is
that it's important in IPv6.
--Steve Bellovin, https://www.cs.columbia.edu/~smb
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec