Re: [IPsec] Fwd: New Version Notification for draft-colitti-ipsecme-esp-ping-01.txt

2024-04-01 Thread Panwei (William)


Michael Richardson  wrote:
> Yes, that's true up to the final hop.
> At the final hop, when the destination address is local, then one *might*
> receive an ICMP Parameter Problem because the SPI is not recognized.
> Maybe.
> If it does not, then the sender will send another packet with TTL one
> larger, and then when it gets no reply try again with two larger, etc.
> 
> Receiving ESPping reply with SPI=8, would be a positive reply that the
> path was clear (in both directions!).

I just wondered if there is a mechanism that doesn't rely on making changes at 
the on-path router/firewall and the final IPsec peer. It seems there is no such 
a perfect mechanism (no changes required except on the sender).
The final IPsec peer may indeed not reply any ICMP packets when it doesn't 
recognize the SPI (and this is highly possible). Therefore, the host can't know 
whether the ESP packet reaches the final IPsec peer. Maybe comparing the result 
of ESP traceroute and the one of UDP traceroute can find something to deduce 
the ESP packet reaches the final IPsec peer, but this isn't guaranteed.
Besides that, even though the final IPsec peer replies an ICMP packet to the 
host, the host can only know the ESP packet can traverse in the direction from 
the host to the IPsec peer, but doesn't know whether the reverse direction also 
works.

(BTW, I'd like to know the test results of this extended traceroute mechanism 
in the real world, if someone would do such tests.)

ESP-ping can be an explicit way to find out the path is clear in both 
directions. It just has a prerequisite that both parties support the ESP-ping 
and both know that the other party supports it.

> One thing which the document does not say, and I'm not sure what to
> say, is what the TTL of the ESP reply ought to be.
> I was contemplating if it should copy the TTL of the incoming packet.
> That would weirdly let one traceroute in the reverse direction too, only
> the ICMPs would go to the receiving host, which is not the host doing
> the traceeroute, so not very useful actually.

The TTL of the packet received by the final IPsec peer isn't the original TTL 
sent by the host, and its value is the original TTL minus the number of on-path 
routers.
So, the TTL of the ESP reply may out of the scope of this draft and just be the 
decision of the IPsec peer's local policy, such as a default TTL.

Regards & Thanks!
Wei PAN (潘伟)

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Fwd: New Version Notification for draft-colitti-ipsecme-esp-ping-01.txt

2024-04-01 Thread Michael Richardson

Panwei (William)  wrote:
> It seems to me that extending the traceroute by using an ESP packet can
> be done right now and has no requirement for the ESP packet format. Any
> ESP packets can work with this mechanism, and there is no need for the
> designated SPIs.

> The receiver will send back an ICMP response when it receives the ESP
> packet with TTL=0, no matter what this ESP packet actually looks
> like. The receiver can be the on-path firewalls or routers, and the
> final IPsec peer.

Yes, that's true up to the final hop.
At the final hop, when the destination address is local, then one *might*
receive an ICMP Parameter Problem because the SPI is not recognized. Maybe.
If it does not, then the sender will send another packet with TTL one larger,
and then when it gets no reply try again with two larger, etc.

Receiving  ESPping reply with SPI=8, would be a positive reply that the path
was clear (in both directions!).

One thing which the document does not say, and I'm not sure what to say, is
what the TTL of the ESP reply ought to be.
I was contemplating if it should copy the TTL of the incoming packet.
That would weirdly let one traceroute in the reverse direction too, only
the ICMPs would go to the receiving host, which is not the host doing the
traceeroute, so not very useful actually.

--
Michael Richardson. o O ( IPv6 IøT consulting )
   Sandelman Software Works Inc, Ottawa and Worldwide






signature.asc
Description: PGP signature
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Fwd: New Version Notification for draft-colitti-ipsecme-esp-ping-01.txt

2024-04-01 Thread Panwei (William)
Hi Paul and Michael, thanks for your explanations.

Michael Richardson  wrote:
> Paul Wouters  wrote:
> > > If you want to do the traceroute to determine how far ESP
> > > actually gets, you need to make sure every node supports
> > > the ESPping.
> >
> > I think people meant to extend traceroute to use an ESP packet
> > instead of an ICMP or UDP packet. The machines in the middle
> > do not need any special support because any packet that hits
> > TTL=0 should solicite an ICMP response.
> 
> That's right, and we yeah, we can do that immediately.
> Perhaps obviously: The responding server needs to implement this
> protocol in order to get a reply though.

It seems to me that extending the traceroute by using an ESP packet can be done 
right now and has no requirement for the ESP packet format. Any ESP packets can 
work with this mechanism, and there is no need for the designated SPIs.
The receiver will send back an ICMP response when it receives the ESP packet 
with TTL=0, no matter what this ESP packet actually looks like. The receiver 
can be the on-path firewalls or routers, and the final IPsec peer.
So, the IPsec sender can determine that the ESP packet can pass through to the 
IPsec peer by using this extended traceroute mechanism and successfully 
receiving the ICMP response from the final IPsec peer.

For the purpose of testing the results of ESP packets traversing the network 
prior to IKE negotiation, is this extended ESP traceroute mechanism enough to 
use? Is it still necessary to define the ESP-ping mechanism?

Regards & Thanks!
Wei PAN (潘伟)

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Fwd: New Version Notification for draft-colitti-ipsecme-esp-ping-01.txt

2024-03-27 Thread Michael Richardson

Panwei (William)  wrote:
> If you want to do the traceroute to determine how far ESP actually
> gets, you need to make sure every node supports the ESPping.

No, only the final machine.
Others would respond with ICMP unreachable when TTL=0

--
Michael Richardson , Sandelman Software Works
 -= IPv6 IoT consulting =-  *I*LIKE*TRAINS*





signature.asc
Description: PGP signature
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Fwd: New Version Notification for draft-colitti-ipsecme-esp-ping-01.txt

2024-03-27 Thread Michael Richardson

Paul Wouters  wrote:
>> If you want to do the traceroute to determine how far ESP actually
>> gets, you need to make sure every node supports the ESPping.

> I think people meant to extend traceroute to use an ESP packet instead
> of an ICMP or UDP packet. The machines in the middle do not need any
> special support because any packet that hits TTL=0 should solicite
> an ICMP response.

That's right, and we yeah, we can do that immediately.
Perhaps obviously: The responding server needs to implement this protocol in
order to get a reply though.

--
Michael Richardson , Sandelman Software Works
 -= IPv6 IoT consulting =-  *I*LIKE*TRAINS*





signature.asc
Description: PGP signature
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Fwd: New Version Notification for draft-colitti-ipsecme-esp-ping-01.txt

2024-03-27 Thread Kan-Ru Chen
Hi,

On Wed, Mar 27, 2024, at 8:24 PM, Panwei (William) wrote:
> Thanks for your and Michael’s clarifications. I’m much clearer now and I’m 
> convinced this is an useful draft.
> I think it would be useful to add one or two sentences in the introduction. 
> An example is given below.
>  
>However, because ESP packets do not share fate with IKE packets, it
>is possible for the network to allow IKE packets but not ESP packets.
>   For example, the on-path firewall may allow UDP packets but discard ESP 
> packets, and IKE negotiation isn’t able to detect this. When NAT function is 
> not used as well, which is common in IPv6 networks, the IPsec session will by 
> default use unencapsulated IPv6 ESP.
>This leads to the IPsec session not being able to exchange any
>packets even though IKE negotiation succeeded.
>  

I wonder if ESP-ping can solve the opposite problem. It is also possible that 
because IKE and ESP are not tracked as same connection, on-path firewall may 
allow initial IKE SA setup and ESP to flow, but disallow rekeying. It is common 
in IPv6 networks to use unencapsulated IPv6 ESP, so the flow does not keep the 
UDP port used by IKE open.

See https://github.com/strongswan/strongswan/issues/1759 for examples of this 
problem.

I'm just a user amused by the fact that IPsec now works better on IPv4 than 
IPv6. Please excuse me if this is not a place to raise this question.

Kan-Ru

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Fwd: New Version Notification for draft-colitti-ipsecme-esp-ping-01.txt

2024-03-27 Thread Paul Wouters

On Wed, 27 Mar 2024, Panwei (William) wrote:


Thanks for your clarification. I'm much clearer about the problems now.

   > > When you find out that the IKEv2 negotiation succeeds but ESP
   > > traffic can't get through, what more information will you get
   > > from sending the ESPping and not receiving a response?
   >
   > That there is a problem with proto=50... So:
   > a) do UDP encap (maybe by manual config, if you are clueful)
   > b) call network support and file a problem report.

I mean, when you find out that the IKEv2 negotiation succeeds but ESP traffic 
can't get through, you can already guess there may be a problem with ESP packet.


Waiting for failure and timeouts afterwards, eg once the IPsec SA is up,
is costly and now you have to try to setup udp-encap or try ipv4. The
idea is to send an ESP-ping beforehand to your server that is known to
support this, and test for a reply. If you don't get it, initiate IKEv2
using IPv4 (basically also guaranteeing NAT and UDP-encap), not native IPv6.


If you want to use ESPping to determine the problem is really because of the 
on-path firewalls or routers discard the ESP packets, you need to make sure the 
IPsec peer also supports the ESPping.


It would be part of the client configuration I guess to try this.


If you want to do the traceroute to determine how far ESP actually gets, you 
need to make sure every node supports the ESPping.


I think people meant to extend traceroute to use an ESP packet instead
of an ICMP or UDP packet. The machines in the middle do not need any
special support because any packet that hits TTL=0 should solicite
an ICMP response.

Paul

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Fwd: New Version Notification for draft-colitti-ipsecme-esp-ping-01.txt

2024-03-27 Thread Panwei (William)
Hi Michael,

Thanks for your clarification. I'm much clearer about the problems now.

> > When you find out that the IKEv2 negotiation succeeds but ESP
> > traffic can't get through, what more information will you get 
> > from sending the ESPping and not receiving a response?
> 
> That there is a problem with proto=50... So:
> a) do UDP encap (maybe by manual config, if you are clueful)
> b) call network support and file a problem report.

I mean, when you find out that the IKEv2 negotiation succeeds but ESP traffic 
can't get through, you can already guess there may be a problem with ESP packet.
If you want to use ESPping to determine the problem is really because of the 
on-path firewalls or routers discard the ESP packets, you need to make sure the 
IPsec peer also supports the ESPping.
If you want to do the traceroute to determine how far ESP actually gets, you 
need to make sure every node supports the ESPping.

Regards & Thanks!
Wei PAN (潘伟)

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Fwd: New Version Notification for draft-colitti-ipsecme-esp-ping-01.txt

2024-03-27 Thread Panwei (William)
Thanks for your and Michael’s clarifications. I’m much clearer now and I’m 
convinced this is an useful draft.
I think it would be useful to add one or two sentences in the introduction. An 
example is given below.

   However, because ESP packets do not share fate with IKE packets, it
   is possible for the network to allow IKE packets but not ESP packets.
  For example, the on-path firewall may allow UDP packets but discard ESP 
packets, and IKE negotiation isn’t able to detect this. When NAT function is 
not used as well, which is common in IPv6 networks, the IPsec session will by 
default use unencapsulated IPv6 ESP.
   This leads to the IPsec session not being able to exchange any
   packets even though IKE negotiation succeeded.

Regards & Thanks!
Wei PAN (潘伟)

From: Lorenzo Colitti 
Sent: Wednesday, March 27, 2024 12:07 PM
To: Panwei (William) 
Cc: Jen Linkova ; ipsec@ietf.org WG ; 
Michael Richardson 
Subject: Re: [IPsec] Fwd: New Version Notification for 
draft-colitti-ipsecme-esp-ping-01.txt

Yes, the idea is to make it possible to leverage native ESP. Pretty much all 
IPv6 networks (at least commercial networks) don't do NAT. But some of them 
drop ESP packets. On these networks, NAT detection will say there is no NAT, 
and the ESP session will be established, but no traffic will flow.

On Tue, Mar 26, 2024 at 6:24 PM Panwei (William) 
mailto:william.pan...@huawei.com>> wrote:
Hi,

I've read the draft and I think I can understand the solution part. But please 
allow me to ask a stupid question about the motivation or use case, because I'm 
a little confused about that.

I feel that the problem of IPv6 ESP traverse failure, as described in the draft 
and presentation slides, is because of NAT. IKEv2 already supports the 
detection of NAT. After the detection of NAT, the peers can use IP + UDP (4500) 
+ ESP to traverse the NAT. Are there some use cases that this existing solution 
doesn't work and this draft tries to solve? Or, are there some use cases that 
IKEv2 fails in detecting the existence of NAT?
I can understand the advantages of native ESP described in the draft: 1) no 
keepalives or fewer keepalives, 2) no overhead of UDP header. Does this draft 
target the use cases where IP + UDP + ESP and IP + ESP can both work in the 
existence of NAT, and try to benefit from the native ESP?

Regards & Thanks!
Wei PAN (潘伟)

> -Original Message-
> From: IPsec mailto:ipsec-boun...@ietf.org>> On 
Behalf Of Jen Linkova
> Sent: Thursday, February 29, 2024 11:28 PM
> To: ipsec@ietf.org<mailto:ipsec@ietf.org>
> Cc: Lorenzo Colitti mailto:lore...@google.com>>; 
Michael Richardson
> mailto:mcr%2bi...@sandelman.ca>>
> Subject: [IPsec] Fwd: New Version Notification for
> draft-colitti-ipsecme-esp-ping-01.txt
>
> -01 version shall address comments received since -00.
> The main change is that payload format is defined similarly to ICMPv6
> echo, and the draft now updates RFC4303, so ESP packets with SPI == 7
> or 8 and next header==59 are not considered to be dummy packets.
>
> Comments are appreciated!
>
>
> -- Forwarded message -
> From: mailto:internet-dra...@ietf.org>>
> Date: Fri, Mar 1, 2024 at 2:24 AM
> Subject: New Version Notification for
> draft-colitti-ipsecme-esp-ping-01.txt
> To: Jen Linkova mailto:furr...@gmail.com>>, Lorenzo 
Colitti
> mailto:lore...@google.com>>, Michael Richardson
> mailto:mcr%2bi...@sandelman.ca>>
>
>
> A new version of Internet-Draft draft-colitti-ipsecme-esp-ping-01.txt
> has been successfully submitted by Jen Linkova and posted to the IETF
> repository.
>
> Name: draft-colitti-ipsecme-esp-ping
> Revision: 01
> Title:ESP Echo Protocol
> Date: 2024-02-29
> Group:Individual Submission
> Pages:7
> URL:
> https://www.ietf.org/archive/id/draft-colitti-ipsecme-esp-ping-01.txt
> Status:
> https://datatracker.ietf.org/doc/draft-colitti-ipsecme-esp-ping/
> HTML:
> https://www.ietf.org/archive/id/draft-colitti-ipsecme-esp-ping-01.html
> HTMLized:
> https://datatracker.ietf.org/doc/html/draft-colitti-ipsecme-esp-ping
> Diff:
> https://author-tools.ietf.org/iddiff?url2=draft-colitti-ipsecme-esp-ping-
> 01
>
> Abstract:
>
>This document defines an ESP echo function which can be used to
>detect whether a given network path supports IPv6 ESP packets.
>
>
>
> The IETF Secretariat
>
>
>
>
> --
> Cheers, Jen Linkova
>
> ___
> IPsec mailing list
> IPsec@ietf.org<mailto:IPsec@ietf.org>
> https://www.ietf.org/mailman/listinfo/ipsec
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Fwd: New Version Notification for draft-colitti-ipsecme-esp-ping-01.txt

2024-03-27 Thread Michael Richardson

Panwei (William)  wrote:
>> I'm not sure I understand how you get this from the Problem
>> Statement.
>> Clearly, we need to clarify the purpose.
>> It's not about detecting NAT, it's about determining if ESP will work or
>> not.
>> It's not about detecting or avoiding *NAT* per-se.
>> We prefer not to have to encapsulate.

> Please forgive my ignorance of the scenarios. My understanding is that
> ESP failure is usually because of the existence of NAT.
> Do you mean ESP may not work even if there is no NAT between the two 
IPsec peers?
> If yes, I'd like to know more about how ESP failed and in what kind of
> situations ESP will fail.

usually, a bad firewall.
One that allows UDP traffic (port 500/4500), but not proto=50.
For IPv4, there will often be NAT, so the proto=50 firewall doesn't matter,
as one has to UDP encap anyway.

>> I think that you are over-estimating the competency of some operators:
>> the experience with IPv6 is often not there.
>> Even when it is, not all equipment vendors are equally competent at
>> implementing/documenting things.

> Is this problem, i.e., IKE works but ESP doesn't work, only exist in
> the IPv6 network? Does IPv4 network have the same problem?

Yes.
It could exist in IPv4, and I've seen it, but NAT44 means you seldom notice.

> Second, will UDP encapsulated ESP get through in these circumstances?

Probably.

>> The purpose of this protocol is to allow that debugging.
>> The network operator people, who are not allowed into the billing
>> system, can instead use an ESPping utility to send ESP traffic, adjusting
>> their firewalls until they understand that UDP!=ESP.

> When you find out that the IKEv2 negotiation succeeds but ESP traffic
> can't get through, what more information will you get from sending the
> ESPping and not receiving a response?

That there is a problem with proto=50... So:
a) do UDP encap (maybe by manual config, if you are clueful)
b) call network support and file a problem report.

--
Michael Richardson , Sandelman Software Works
 -= IPv6 IoT consulting =-  *I*LIKE*TRAINS*





signature.asc
Description: PGP signature
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Fwd: New Version Notification for draft-colitti-ipsecme-esp-ping-01.txt

2024-03-26 Thread Lorenzo Colitti
Yes, the idea is to make it possible to leverage native ESP. Pretty much
all IPv6 networks (at least commercial networks) don't do NAT. But some of
them drop ESP packets. On these networks, NAT detection will say there is
no NAT, and the ESP session will be established, but no traffic will flow.

On Tue, Mar 26, 2024 at 6:24 PM Panwei (William) 
wrote:

> Hi,
>
> I've read the draft and I think I can understand the solution part. But
> please allow me to ask a stupid question about the motivation or use case,
> because I'm a little confused about that.
>
> I feel that the problem of IPv6 ESP traverse failure, as described in the
> draft and presentation slides, is because of NAT. IKEv2 already supports
> the detection of NAT. After the detection of NAT, the peers can use IP +
> UDP (4500) + ESP to traverse the NAT. Are there some use cases that this
> existing solution doesn't work and this draft tries to solve? Or, are there
> some use cases that IKEv2 fails in detecting the existence of NAT?
> I can understand the advantages of native ESP described in the draft: 1)
> no keepalives or fewer keepalives, 2) no overhead of UDP header. Does this
> draft target the use cases where IP + UDP + ESP and IP + ESP can both work
> in the existence of NAT, and try to benefit from the native ESP?
>
> Regards & Thanks!
> Wei PAN (潘伟)
>
> > -Original Message-
> > From: IPsec  On Behalf Of Jen Linkova
> > Sent: Thursday, February 29, 2024 11:28 PM
> > To: ipsec@ietf.org
> > Cc: Lorenzo Colitti ; Michael Richardson
>     > 
> > Subject: [IPsec] Fwd: New Version Notification for
> > draft-colitti-ipsecme-esp-ping-01.txt
> >
> > -01 version shall address comments received since -00.
> > The main change is that payload format is defined similarly to ICMPv6
> > echo, and the draft now updates RFC4303, so ESP packets with SPI == 7
> > or 8 and next header==59 are not considered to be dummy packets.
> >
> > Comments are appreciated!
> >
> >
> > -- Forwarded message -
> > From: 
> > Date: Fri, Mar 1, 2024 at 2:24 AM
> > Subject: New Version Notification for
> > draft-colitti-ipsecme-esp-ping-01.txt
> > To: Jen Linkova , Lorenzo Colitti
> > , Michael Richardson
> > 
> >
> >
> > A new version of Internet-Draft draft-colitti-ipsecme-esp-ping-01.txt
> > has been successfully submitted by Jen Linkova and posted to the IETF
> > repository.
> >
> > Name: draft-colitti-ipsecme-esp-ping
> > Revision: 01
> > Title:ESP Echo Protocol
> > Date: 2024-02-29
> > Group:Individual Submission
> > Pages:7
> > URL:
> >
> https://www.ietf.org/archive/id/draft-colitti-ipsecme-esp-ping-01.txt
> > Status:
> > https://datatracker.ietf.org/doc/draft-colitti-ipsecme-esp-ping/
> > HTML:
> >
> https://www.ietf.org/archive/id/draft-colitti-ipsecme-esp-ping-01.html
> > HTMLized:
> > https://datatracker.ietf.org/doc/html/draft-colitti-ipsecme-esp-ping
> > Diff:
> >
> https://author-tools.ietf.org/iddiff?url2=draft-colitti-ipsecme-esp-ping-
> > 01
> >
> > Abstract:
> >
> >This document defines an ESP echo function which can be used to
> >detect whether a given network path supports IPv6 ESP packets.
> >
> >
> >
> > The IETF Secretariat
> >
> >
> >
> >
> > --
> > Cheers, Jen Linkova
> >
> > ___
> > IPsec mailing list
> > IPsec@ietf.org
> > https://www.ietf.org/mailman/listinfo/ipsec
>
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Fwd: New Version Notification for draft-colitti-ipsecme-esp-ping-01.txt

2024-03-26 Thread Panwei (William)
Michael Richardson  wrote:
> I'm not sure I understand how you get this from the Problem
> Statement.
> Clearly, we need to clarify the purpose.
> It's not about detecting NAT, it's about determining if ESP will work or
> not.
> It's not about detecting or avoiding *NAT* per-se.
> We prefer not to have to encapsulate.

Please forgive my ignorance of the scenarios. My understanding is that ESP 
failure is usually because of the existence of NAT.
Do you mean ESP may not work even if there is no NAT between the two IPsec 
peers?
If yes, I'd like to know more about how ESP failed and in what kind of 
situations ESP will fail.

> I think that you are over-estimating the competency of some operators:
> the experience with IPv6 is often not there.
> Even when it is, not all equipment vendors are equally competent at 
> implementing/documenting things.

Is this problem, i.e., IKE works but ESP doesn't work, only exist in the IPv6 
network? Does IPv4 network have the same problem?

> Imagine a situation where IPsec will be used in a (sub)site to site
> configuration.  For instance, between a billing system and an
> outsourced credit card processor. {Not replacing TLS, but in addition to}
> The administrators of the billing system request "IPsec" from their
> (inhouse) network operator, and the operator looks up their howto list,
> and enables UDP port 500 and 4500, because that's what IPv4 wanted.
> Now the billing system people wonder why the it seems to work, but in
> fact no traffic gets through.  It can be very hard to debug.

I have two questions here.
First, what kind of reasons (except of NAT) will cause that no traffic gets 
through?
Second, will UDP encapsulated ESP get through in these circumstances?

> The purpose of this protocol is to allow that debugging.
> The network operator people, who are not allowed into the billing
> system, can instead use an ESPping utility to send ESP traffic, adjusting
> their firewalls until they understand that UDP!=ESP.

When you find out that the IKEv2 negotiation succeeds but ESP traffic can't get 
through, what more information will you get from sending the ESPping and not 
receiving a response?
How does this draft help the adjustments and what kind of adjustments will be 
performed?

> We also realized that one can write/modify traceroute to use ESPping
> to determine how far ESP actually gets.

This sounds useful.

Regards & Thanks!
Wei PAN (潘伟)

> There are also situations where there are ECMP routers in the way which
> simply do not know what to do with ESP.  A network operator could
> introduce such a sytem into a previously working site-to-site VPN and
> suddenly things stop working, or get poor performance.
> 
> --
> Michael Richardson , Sandelman Software
> Works
>  -= IPv6 IoT consulting =-  *I*LIKE*TRAINS*
> 
> 

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Fwd: New Version Notification for draft-colitti-ipsecme-esp-ping-01.txt

2024-03-26 Thread Michael Richardson

Panwei (William)  wrote:
> I feel that the problem of IPv6 ESP traverse failure, as described in
> the draft and presentation slides, is because of NAT. IKEv2 already

I'm not sure I understand how you get this from the Problem Statement.
Clearly, we need to clarify the purpose.
It's not about detecting NAT, it's about determining if ESP will work or not.

> supports the detection of NAT. After the detection of NAT, the peers
> can use IP + UDP (4500) + ESP to traverse the NAT. Are there some use
> cases that this existing solution doesn't work and this draft tries to
> solve? Or, are there some use cases that IKEv2 fails in detecting the
> existence of NAT?

It's not about detecting or avoiding *NAT* per-se.
We prefer not to have to encapsulate.

I think that you are over-estimating the competency of some operators: the
experience with IPv6 is often not there.   Even when it is, not all equipment
vendors are equally competent at implementing/documenting things.

Imagine a situation where IPsec will be used in a (sub)site to site
configuration.  For instance, between a billing system and an outsourced
credit card processor. {Not replacing TLS, but in addition to}
The administrators of the billing system request "IPsec" from their (inhouse)
network operator, and the operator looks up their howto list, and enables UDP
port 500 and 4500, because that's what IPv4 wanted.
Now the billing system people wonder why the it seems to work, but in fact no
traffic gets through.  It can be very hard to debug.

The purpose of this protocol is to allow that debugging.
The network operator people, who are not allowed into the billing system, can
instead use an ESPping utility to send ESP traffic, adjusting their firewalls
until they understand that UDP!=ESP.

We also realized that one can write/modify traceroute to use ESPping to
determine how far ESP actually gets.

There are also situations where there are ECMP routers in the way which
simply do not know what to do with ESP.  A network operator could introduce
such a sytem into a previously working site-to-site VPN and suddenly things
stop working, or get poor performance.

--
Michael Richardson , Sandelman Software Works
 -= IPv6 IoT consulting =-  *I*LIKE*TRAINS*





signature.asc
Description: PGP signature
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Fwd: New Version Notification for draft-colitti-ipsecme-esp-ping-01.txt

2024-03-26 Thread Panwei (William)
Hi,

I've read the draft and I think I can understand the solution part. But please 
allow me to ask a stupid question about the motivation or use case, because I'm 
a little confused about that.

I feel that the problem of IPv6 ESP traverse failure, as described in the draft 
and presentation slides, is because of NAT. IKEv2 already supports the 
detection of NAT. After the detection of NAT, the peers can use IP + UDP (4500) 
+ ESP to traverse the NAT. Are there some use cases that this existing solution 
doesn't work and this draft tries to solve? Or, are there some use cases that 
IKEv2 fails in detecting the existence of NAT?
I can understand the advantages of native ESP described in the draft: 1) no 
keepalives or fewer keepalives, 2) no overhead of UDP header. Does this draft 
target the use cases where IP + UDP + ESP and IP + ESP can both work in the 
existence of NAT, and try to benefit from the native ESP?

Regards & Thanks!
Wei PAN (潘伟)

> -Original Message-
> From: IPsec  On Behalf Of Jen Linkova
> Sent: Thursday, February 29, 2024 11:28 PM
> To: ipsec@ietf.org
> Cc: Lorenzo Colitti ; Michael Richardson
> 
    > Subject: [IPsec] Fwd: New Version Notification for
    > draft-colitti-ipsecme-esp-ping-01.txt
> 
> -01 version shall address comments received since -00.
> The main change is that payload format is defined similarly to ICMPv6
> echo, and the draft now updates RFC4303, so ESP packets with SPI == 7
> or 8 and next header==59 are not considered to be dummy packets.
> 
> Comments are appreciated!
> 
> 
> -- Forwarded message -
> From: 
> Date: Fri, Mar 1, 2024 at 2:24 AM
> Subject: New Version Notification for
> draft-colitti-ipsecme-esp-ping-01.txt
> To: Jen Linkova , Lorenzo Colitti
> , Michael Richardson
> 
> 
> 
> A new version of Internet-Draft draft-colitti-ipsecme-esp-ping-01.txt
> has been successfully submitted by Jen Linkova and posted to the IETF
> repository.
> 
> Name: draft-colitti-ipsecme-esp-ping
> Revision: 01
> Title:ESP Echo Protocol
> Date: 2024-02-29
> Group:Individual Submission
> Pages:7
> URL:
> https://www.ietf.org/archive/id/draft-colitti-ipsecme-esp-ping-01.txt
> Status:
> https://datatracker.ietf.org/doc/draft-colitti-ipsecme-esp-ping/
> HTML:
> https://www.ietf.org/archive/id/draft-colitti-ipsecme-esp-ping-01.html
> HTMLized:
> https://datatracker.ietf.org/doc/html/draft-colitti-ipsecme-esp-ping
> Diff:
> https://author-tools.ietf.org/iddiff?url2=draft-colitti-ipsecme-esp-ping-
> 01
> 
> Abstract:
> 
>This document defines an ESP echo function which can be used to
>detect whether a given network path supports IPv6 ESP packets.
> 
> 
> 
> The IETF Secretariat
> 
> 
> 
> 
> --
> Cheers, Jen Linkova
> 
> ___
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


[IPsec] Fwd: New Version Notification for draft-colitti-ipsecme-esp-ping-01.txt

2024-02-29 Thread Jen Linkova
-01 version shall address comments received since -00.
The main change is that payload format is defined similarly to ICMPv6
echo, and the draft now updates RFC4303, so ESP packets with SPI == 7
or 8 and next header==59 are not considered to be dummy packets.

Comments are appreciated!


-- Forwarded message -
From: 
Date: Fri, Mar 1, 2024 at 2:24 AM
Subject: New Version Notification for draft-colitti-ipsecme-esp-ping-01.txt
To: Jen Linkova , Lorenzo Colitti
, Michael Richardson 


A new version of Internet-Draft draft-colitti-ipsecme-esp-ping-01.txt has been
successfully submitted by Jen Linkova and posted to the
IETF repository.

Name: draft-colitti-ipsecme-esp-ping
Revision: 01
Title:ESP Echo Protocol
Date: 2024-02-29
Group:Individual Submission
Pages:7
URL:  https://www.ietf.org/archive/id/draft-colitti-ipsecme-esp-ping-01.txt
Status:   https://datatracker.ietf.org/doc/draft-colitti-ipsecme-esp-ping/
HTML: https://www.ietf.org/archive/id/draft-colitti-ipsecme-esp-ping-01.html
HTMLized: https://datatracker.ietf.org/doc/html/draft-colitti-ipsecme-esp-ping
Diff: 
https://author-tools.ietf.org/iddiff?url2=draft-colitti-ipsecme-esp-ping-01

Abstract:

   This document defines an ESP echo function which can be used to
   detect whether a given network path supports IPv6 ESP packets.



The IETF Secretariat




-- 
Cheers, Jen Linkova

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec