...
> - it fails to characterize the range of protocols for which you
believe this argument applies,
http://www.ietf.org/mail-archive/web/ipsec/current/msg05070.html
This is one example, we could think of some more.
This is only one example, and I think it is not "mainstream", so more
examples would be helpful.
>
> -it fails to explain how WESP is relevant, since a receiver has the
This has already been discussed in this email thread earlier.
Not a very specific reference :-(.
> ability to process encrypted packets. WESP is a protocol that has been
promoted as designed to aid middle boxes, not end systems
Border Gateway Protocol (BGP) (http://www.ietf.org/rfc/rfc4271.txt)
was originally designed to work as an Exterior Gateway Protocol (EGP).
Today besides working as an EGP it is used in myriad other
applications, from discovering nodes in a VPN to distributing advisory
messages to remote network operators. So, i dont see a reason why we
should restrict ourselves to the applications for which a protocol can
be used ..
I would NEVER use BGP as a good example of a protocol that has been
extended to cover a broader range of contexts, if security is the
focus of the discussion.
Let me try to recapitulate the context of our discussion, since I
have had trouble following the thread:
- the principle example offered is OSPFv3 use of IPsec
- OSPFv3 relies on both unicast and multicast SAs
- in either case, a router receiving IPsec-protected OSPFv3 traffic
will have an SAD entry for the traffic, which means that the
router will know that the traffic will be protected via AH
or ESP. if ESP is employed, a router receiving traffic will know
ESP-NULL is used.
- RFC 4552 mandates support for using different SAs for DSCP-marked
traffic
- RFC 4552 calls for manual keying for both unicast and multicast SAs,
and states that a receiver is not checking sequence numbers.
In a given OSPF context (e.g., an AS), all the routers are operated
by the same administrative entity (based on the definition of an AS).
If the AS in which OSPF is being employed chooses to use ESP-NULL,
all the routers can be configured to require this, as part of local
SPD management.
Why do we need to use WESP in this context? The current argument you
provided was that this was an issue for a router receiving OSPF
traffic, not a middlebox issue. But the router knows that the traffic
will be ESP-NULL, and knows the algorithm employed, so it should be
able to examine this traffic easily. If the router wants to process
traffic out-of-order, after examination, that too is easy, since
there is no receiver sequence number checking, so processing the rest
of the traffic (potentially with gaps) will not be a problem from an
IPsec perspective.
I went back and analyzed the thread to see how we got to this point.
In his message of 11/16, Manav said:
And the reason why you might want to use WESP is to prioritize
certain protocol packets over the others, as is normally done for v4
control packets (e.g. OSPFv3 HELLOs and ACKs over other OSPFv3
packets)
Tero question this assertion, citing packet ordering concerns, and
Manav provided the following cryptic comment:
This is an implementation specific optimization that has already
been solved in multiple implementations.
That caused me to ask what "implementation specific" optimizations meant, which
resulted in your response (11/17)
Do the seq number check, and then place the packets in different
priority queues/paths based on the kind of packet it is. Proprietary
ASICs on the routers can easily do this and its one of those things
that differentiate one vendor from the other.
This response seems confusing, since it discusses a sequence number
check being performed in a context (OSPFv3) that calls for no such
checks. Sriram noted that in a manual keying context (not just
OSPFv3) sequence checking is not performed,
which reaffirmed the notion that this thread went awry.
Finally, Gregory said:
GML> Or perhaps, a local security policy decision to ease up on the
size of the enforcement window -- aka ease security requirements --
in order to get more QoS enforcement capability -- aka convenience
-- ??
Which prompted my reply (10/21) noting that 4301 mandates QoS support
via use of multiple SAs (which, as noted above, is also called for by
4552) and that
using larger receive windows is always a local matter, not an
implementation specific optimization.
It was this response that you labelled as "all wrong" and said:
... The sender is sending packets with the same QoS
parameters; its the receiver thats trying to prioritize some packets
over the others. One would typically do this for the Hellos/KeepAlives
that are associated with a protocol, so that the adjacency/peering
session are not timed out.
So, it does not appear that the context has changed since Manav cited
OSPFv3 a week ago, yet all the arguments about sequence number
checking (by IPsec) are irrelevant in this context. I have seen no
good arguments about why WESP is needed here, i.e., what benefits it
offers for a router receiving OSPF traffic, some of which may need to
be processed out-of-order.
Steve
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec