Ashok,
Hi All,

As per my understanding, the anti-replay feature in IPsec helps to save CPU cycles in the IPsec gateway (or host) by discarding the replayed packets so that costly operation like MAC calculation and decryption can be avoided for such packets.
Is my understanding right?
only partially. The main reason for this is to protect an app from receiving
replayed traffic that it might not otherwise detect and reject. Not an issue for
TCP, but a possible issue for UDP-based apps.
From "A2.3. Pseudo-Code Example" in RFC-4303, looks like any packet which
are older than the anti-replay window start, would skip the anti-replay check
and MAC check will be done. Though MAC check would fail (because Seqh
would be incorrect), MAC calculation would still happens. It is most likely to happen for almost all replayed packets in a high throughput tunnel. Isn't it?
That's not the intent. The intent is to immediately drop any packet for which the sequence number is older than the AR window, thus avoiding crypto operations
that are not necessary.
Without ESN support, we will discard all packets whose sequence number
is less than the anti-replay window base. So the problem which I see is,
only with ESN support. Please correct me if I am missing something.
See comments above.

Steve
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to