Re: [IPsec] WESP - Roadmap Ahead

2009-11-29 Thread Stephen Kent
Jack, Thanks for describing the additional selection criteria that must be employed to avoid the problem I cited. Given this more complete description of the selection criteria, I am not convinced that that is a significant benefit for using WESP in this context. - Whether using WESP or

Re: [IPsec] WESP - Roadmap Ahead

2009-11-25 Thread Tero Kivinen
Jack Kohn writes: Assume we dont have WESP. I would like to, but unfortunately I lost :-) The end router having scores of OSPF adjacencies will have following rules in its database for *each* adjacency: Incoming Pkt carries SPI X, then look at the nth bit and if its a OSPF HELLO, put it

Re: [IPsec] WESP - Roadmap Ahead

2009-11-25 Thread Stephen Kent
At 12:11 PM +0100 11/25/09, Daniel Migault wrote: Hi Manav, I agree that for an already negotiated SA, the SPD lookup detects IP source address spoofing. So in that case ESP detects the address spoofing during the SPD check whereas AH would detect it while checking the signature check.

Re: [IPsec] WESP - Roadmap Ahead

2009-11-25 Thread Jack Kohn
Now, assume that we were using WESP. You would need just two rules in your filter database saying the following: Incoming Pkt is WESP integrity Protected, then look at the nth bit and if its a OSPF HELLO, put it in Ospfv3HighPrioQueue. Incoming Pkt is WESP integrity Protected, then look

Re: [IPsec] WESP - Roadmap Ahead

2009-11-22 Thread Stephen Kent
At 11:09 PM +0530 11/21/09, Jack Kohn wrote: Steve, 4301 contains We have explicit directions on how to use multiple SAs when the peers know that they want to send traffic with different QoS parameters. This appears to be an instance where the middle boxes are to examining traffic, and

Re: [IPsec] WESP - Roadmap Ahead

2009-11-22 Thread Jack Kohn
You got it all wrong. The sender is sending packets with the same QoS parameters; its the receiver thats trying to prioritize some packets over the others. One would typically do this for the Hellos/KeepAlives that are associated with a protocol, so that the adjacency/peering session are

[IPsec] WESP - Roadmap Ahead

2009-11-15 Thread Tero Kivinen
Jack Kohn writes: From operational perspective if we are supporting both v4 and v6 (and we will) then having different protocols ESP and AH is and will be a nightmare. Common denominator is ESP-Null. However, there were issues with ESP-Null as it couldnt be deep inspected which has now been

Re: [IPsec] WESP - Roadmap Ahead

2009-11-15 Thread Bhatia, Manav (Manav)
It will take several years before implementations start to implement WESP, and even more years before hardware chips support WESP. Most of the IPsec users are still using IKEv1, even when we published IKEv2 2005, i.e. 4 years ago. And IKEv2 draft was finished and publication was requested

Re: [IPsec] WESP - Roadmap Ahead

2009-11-13 Thread Steven Bellovin
On Nov 13, 2009, at 12:16 AM, Stephen Kent wrote: My message pointed out that there was no mention of options, Your reply picked a couple of option examples and argued that they were either not used or did not pose a security problem. The right way to generate a god answer is to

Re: [IPsec] WESP - Roadmap Ahead

2009-11-12 Thread Steven Bellovin
On Nov 11, 2009, at 3:56 PM, Stephen Kent wrote: Jack, I would have no problem deprecating AH in the context of the IPsec architecture document, if others agree. It is less efficient than ESP-NULL. However, other WGs have cited AH as the IPsec protocol of choice for

Re: [IPsec] WESP - Roadmap Ahead

2009-11-12 Thread Stephen Kent
At 6:48 AM +0530 11/13/09, Bhatia, Manav (Manav) wrote: Daniel, AH is a security feature we need to keep for header authentication Am really not sure about the value that AH adds even in case of header authentication. So what fields does AH protect: Version, Payload length, Next Header,

Re: [IPsec] WESP - Roadmap Ahead

2009-11-12 Thread Bhatia, Manav (Manav)
So what fields does AH protect: Version, Payload length, Next Header, Source IP and dest IP you forgot IPv4 and IPv6 options that have predictable values at the destination Lets start with the IPv6 Type 0 Route Header (aka Source Routing in v4 parlance), which is a mutable but a

Re: [IPsec] WESP - Roadmap Ahead

2009-11-12 Thread Bhatia, Manav (Manav)
lookup fail? Cheers, Manav -Original Message- From: Richard Graveman [mailto:rfgrave...@gmail.com] Sent: Friday, November 13, 2009 7.07 AM To: Bhatia, Manav (Manav) Cc: Daniel Migault; ipsec@ietf.org; Stephen Kent; Kaeo; mer...@core3.amsl.com Subject: Re: [IPsec] WESP - Roadmap

Re: [IPsec] WESP - Roadmap Ahead

2009-11-11 Thread Bhatia, Manav (Manav)
Scott, From: ipsec-boun...@ietf.org On Behalf Of Scott C Moonen Sent: Thursday, November 12, 2009 2.37 AM To: Jack Kohn Cc: ipsec@ietf.org; ipsec-boun...@ietf.org Subject: Re: [IPsec] WESP - Roadmap Ahead Jack, I'm not sure it's clear yet whether WESP will be widely adopted

Re: [IPsec] WESP - Roadmap Ahead

2009-11-11 Thread Bhatia, Manav (Manav)
Steve, I would have no problem deprecating AH in the context of the IPsec architecture document, if others agree. It is less efficient than ESP-NULL. However, other WGs have cited AH as the IPsec protocol of choice for integrity/authentication in their environments, so there will be a

Re: [IPsec] WESP - Roadmap Ahead

2009-11-11 Thread Stephen Kent
At 7:44 AM +0530 11/12/09, Bhatia, Manav (Manav) wrote: Steve, I would have no problem deprecating AH in the context of the IPsec architecture document, if others agree. It is less efficient than ESP-NULL. However, other WGs have cited AH as the IPsec protocol of choice for

Re: [IPsec] WESP - Roadmap Ahead

2009-11-11 Thread Bhatia, Manav (Manav)
All of the standards I've seen that explicitly define how IPsec is to be used for authentication (including RFC 4552 - Authentication/ Confidentiality for OSPFv3) say that for authentication ESP-Null MUST be used and AH MAY. Yes, this is correct. The latest PIM-SM authentication

Re: [IPsec] WESP - Roadmap Ahead

2009-11-11 Thread Jack Kohn
Whoops, I was wrong. I looked at 4552 and they do cite ESP-NULL (although they never refer to it that way) as a MUST, and AH as a MAY. Ok, so can we work on deprecating AH? This way new standards defined in other WGs dont have to provide support for AH. Jack I probably was confused because

Re: [IPsec] WESP - Roadmap Ahead

2009-11-11 Thread Merike Kaeo
All of the standards I've seen that explicitly define how IPsec is to be used for authentication (including RFC 4552 - Authentication/ Confidentiality for OSPFv3) say that for authentication ESP-Null MUST be used and AH MAY. Which RFCs specify AH specifically as a MUST for authentication/

Re: [IPsec] WESP - Roadmap Ahead

2009-11-11 Thread Daniel Migault
On Thu, Nov 12, 2009 at 5:30 AM, Jack Kohn kohn.j...@gmail.com wrote: Whoops, I was wrong. I looked at 4552 and they do cite ESP-NULL (although they never refer to it that way) as a MUST, and AH as a MAY. Ok, so can we work on deprecating AH? This way new standards defined in other WGs