You are mixing everything up. It is too much work to correct you over email. I
will try to help you at the meeting.
regards,
fred
On 16 Nov 2011, at 15:35, Yoav Nir wrote:
> OK.
>
> Routing protocols are not security protocols. That's fine. Neither is HTTP.
>
> BGPSEC and SIDR implement a layer of security on top of BGP to overcome this
> issue, and that may be used in the Internet.
>
> OSPF and NHRP are designed to be used in closed environments (corporate
> networks), where everyone is assumed to be "playing nice", so there has never
> been as much requirement for a security layer, and in fact there is no
> security layer to NHRP.
>
> When you extend NHRP to an overlay network over the Internet, as you do with
> GRE, you are still fine as long as everybody "plays nice". With the obvious
> example of a corporate network with tunnels to the branches in New York,
> London, Paris, and Shang-hai you're still fine, because all the gateways are
> configured by the same person or organization, or at least they are part of
> the same hierarchy, although by this point you may need to be worried about
> misconfiguration.
>
> With a multiple-administrative-domain use case, all bets are off. What would
> prevent a gateway anywhere from claiming responsibility for the addresses of
> the facebook.com server? That would cause several bad things:
> - that gateway gets access to all facebook traffic in the entire overlay
> network
> - all the gateways have to work extra hard encrypting facebook content for no
> reason at all.
>
> This is a real problem regardless of whether we use IPsec tunnels or GRE
> tunnels. Neither IKE nor NHRP has a secure routing layer. Whichever solution
> we pick (as a working group) we will still need to develop a security layer,
> which may or may not be based on what the BGP people are doing.
>
> This is especially important for cross-domain use cases, but would be very
> helpful for same-domain as well.
>
> Yoav
>
> On Nov 16, 2011, at 3:11 PM, Frederic Detienne wrote:
>
>>
>> Security is a matter of architecture and end-to-end design. Several
>> mechanisms are used to achieve an efficient balance with complexity.
>> Features and security protocols are only building blocks.
>>
>> IPsec and IKE are not the only features that protect a network and routing
>> as a security policy really is not a problem until shown otherwise.
>>
>> Again, I urge you to be specific because there is nothing tangible in your
>> claims. I understand what you mean but if you rationalized it, you would see
>> your intuition fools you.
>>
>>
>> On 16 Nov 2011, at 14:17, Yoav Nir wrote:
>>
>>>
>>> On Nov 16, 2011, at 1:45 PM, Tero Kivinen wrote:
>>>
>>>> Yoav Nir writes:
>>>>>> So you still didn't explain what GRE does better than modern IPsec
>>>>>> tunneling?
>>>>>
>>>>> I think GRE (or any tunnel that is not IPsec - like L2TP) allows
>>>>> them to avoid having to deal with RFC 4301 stuff like SPD. The only
>>>>> selector they need is for the GRE tunnel (protocol 43?) or the L2TP
>>>>> tunnel (UDP 1701).
>>>>
>>>> I.e. bypass the security mechanishms provided the security protocol.
>>>
>>> Yes!
>>>
>>>>> That means that your security policy is effectively determined by
>>>>> the routing protocol.
>>>>
>>>> I.e. move the security from the security protocol to something else
>>>> which is not a security protocol. Is this really something we want to
>>>> do?
>>>
>>> Define "we"
>>>
>>>> Who is going to make sure the end result is secure?
>>>
>>> The customer
>>>
>>>
>>
>>
>> Scanned by Check Point Total Security Gateway.
>
>
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec