We agree, and tried to capture that in the current version at:
http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-02 

with text such as:

   Next Header, 8 bits:  If using ESP-NULL, this field MUST be
   equal to the Next Header field in the ESP trailer. If using ESP
   in encryption mode, this field MUST be set to zero..

and in the security considerations section:

   ESP is end-to-end and it will be impossible for the intermediate
   devices to verify that all the fields in the WESP header are
   correct. It is thus possible to tweak the WESP header so that
   the packet sneaks past the firewall if the fields in the WESP
   header are set to something that the firewall will allow. The
   endpoint thus must verify the sanity of the WESP header before
   accepting the packet. In an extreme case, someone colluding with
   the attacker, could change the WESP fields back to the original
   values so that the attack goes unnoticed. However, this is not a
   new problem and it already exists IPSec.

Perhaps we need more details on what exactly we mean by "the
endpoint thus must verify the sanity of the WESP header before accepting
the packet"? And the action to drop the offending packet?

----- Original Message ----
> From: Stephen Kent <k...@bbn.com>
> To: "Bhatia, Manav (Manav)" <ma...@alcatel-lucent.com>
> Cc: "ipsec@ietf.org" <ipsec@ietf.org>; gabriel montenegro 
> <g_e_montene...@yahoo.com>; Tero Kivinen <kivi...@iki.fi>
> Sent: Tuesday, May 12, 2009 8:18:18 AM
> Subject: Re: [IPsec] Next Header field in WESP header
> 
> If we elect to keep the next header field, to help middle boxes quickly 
> locate 
> header fields of interest to them, then we MUST require the recipient of each 
> message to do a (well-defined) consistency check on the packet, for the 
> reasons 
> I cited in  SF.
> 
> Steve
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to