You are mixing everything up. It is too much work to correct you over email. I 
will try to help you at the meeting.

regards,

        fred

On 16 Nov 2011, at 15:35, Yoav Nir wrote:

> OK.
> 
> Routing protocols are not security protocols. That's fine. Neither is HTTP.
> 
> BGPSEC and SIDR implement a layer of security on top of BGP to overcome this 
> issue, and that may be used in the Internet.
> 
> OSPF and NHRP are designed to be used in closed environments (corporate 
> networks), where everyone is assumed to be "playing nice", so there has never 
> been as much requirement for a security layer, and in fact there is no 
> security layer to NHRP.
> 
> When you extend NHRP to an overlay network over the Internet, as you do with 
> GRE, you are still fine as long as everybody "plays nice". With the obvious 
> example of a corporate network with tunnels to the branches in New York, 
> London, Paris, and Shang-hai you're still fine, because all the gateways are 
> configured by the same person or organization, or at least they are part of 
> the same hierarchy, although by this point you may need to be worried about 
> misconfiguration.
> 
> With a multiple-administrative-domain use case, all bets are off. What would 
> prevent a gateway anywhere from claiming responsibility for the addresses of 
> the facebook.com server?  That would cause several bad things:
> - that gateway gets access to all facebook traffic in the entire overlay 
> network
> - all the gateways have to work extra hard encrypting facebook content for no 
> reason at all.
> 
> This is a real problem regardless of whether we use IPsec tunnels or GRE 
> tunnels. Neither IKE nor NHRP has a secure routing layer. Whichever solution 
> we pick (as a working group) we will still need to develop a security layer, 
> which may or may not be based on what the BGP people are doing.
> 
> This is especially important for cross-domain use cases, but would be very 
> helpful for same-domain as well.
> 
> Yoav
> 
> On Nov 16, 2011, at 3:11 PM, Frederic Detienne wrote:
> 
>> 
>> Security is a matter of architecture and end-to-end design. Several 
>> mechanisms are used to achieve an efficient balance with complexity. 
>> Features and security protocols are only building blocks.
>> 
>> IPsec and IKE are not the only features that protect a network and routing 
>> as a security policy really is not a problem until shown otherwise.
>> 
>> Again, I urge you to be specific because there is nothing tangible in your 
>> claims. I understand what you mean but if you rationalized it, you would see 
>> your intuition fools you.
>> 
>> 
>> On 16 Nov 2011, at 14:17, Yoav Nir wrote:
>> 
>>> 
>>> On Nov 16, 2011, at 1:45 PM, Tero Kivinen wrote:
>>> 
>>>> Yoav Nir writes:
>>>>>> So you still didn't explain what GRE does better than modern IPsec
>>>>>> tunneling?
>>>>> 
>>>>> I think GRE (or any tunnel that is not IPsec - like L2TP) allows
>>>>> them to avoid having to deal with RFC 4301 stuff like SPD. The only
>>>>> selector they need is for the GRE tunnel (protocol 43?) or the L2TP
>>>>> tunnel (UDP 1701). 
>>>> 
>>>> I.e. bypass the security mechanishms provided the security protocol. 
>>> 
>>> Yes!
>>> 
>>>>> That means that your security policy is effectively determined by
>>>>> the routing protocol.
>>>> 
>>>> I.e. move the security from the security protocol to something else
>>>> which is not a security protocol. Is this really something we want to
>>>> do?
>>> 
>>> Define "we"
>>> 
>>>> Who is going to make sure the end result is secure?
>>> 
>>> The customer
>>> 
>>> 
>> 
>> 
>> Scanned by Check Point Total Security Gateway.
> 
> 

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to