Yes to both, based on arguments already discussed numerous times in the WG via 
presentations, 12 iterations of the draft and multiple WG last calls + AD 
reviews!

The main motivation for extending the ICV was to counter some of the issues 
originally raised by Steve Kent - malicious entities modifying portions of the 
WESP header to bypass legitimate parsing of the packet by Trusted Intermediary 
(TI) devices such as IDS/IPS/etc. This can be addressed by the recipient 
explicitly validating the WESP header before accepting the packet or implicitly 
by including the WESP header as part of the ICV check. 

The motivation for allowing WESP to be used for encrypted data was brought up 
as a consistency argument and also allows for future extensibility in a uniform 
manner. I agree that this was not part of the original charter, as shown in the 
earlier revisions of the WESP drafts. 
BUT, this was discussed numerous times within the WG (including an open ticket 
on scope) and it was agreed that this would be a useful bit to include in the 
flags, hence introduced in the latter revisions of the draft. Note that this 
does not mandate using WESP for encrypted traffic, but allows it as optional 
and can be dictated as part of the session setup based on local policy. Another 
benefit may be that in running mixed mode environments (encrypted + ESP_NULL 
traffic), it allows for an explicit distinction from the packet that certain 
traffic is encrypted and other traffic is not. Otherwise, one would use ESP and 
WESP in these mixed mode environments and to be absolutely sure if ESP traffic 
is encrypted or not, would need to fall back to heuristics, which somewhat 
defeats the object of having this spec.  

I am certainly not a fan of heuristics, as it is complex, non-deterministic, 
will require updates for new algorithms added into ESP, as well as other 
arguments already cited numerous times, so would like to see a consistent 
deterministic way to identify the traffic.  

Thanks, 
- Ken
 

>-----Original Message-----
>From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf
>Of Yaron Sheffer
>Sent: Monday, January 04, 2010 2:27 PM
>To: ipsec@ietf.org
>Subject: [IPsec] Traffic visibility - consensus call
>
>Hi,
>
>We have had a few "discusses" during the IESG review of the WESP draft.
>To help resolve them, we would like to reopen the following two
>questions to WG discussion. Well reasoned answers are certainly
>appreciated. But plain "yes" or "no" would also be useful in judging the
>group's consensus.
>
>- The current draft (http://tools.ietf.org/html/draft-ietf-ipsecme-
>traffic-visibility-11) defines the ESP trailer's ICV calculation to
>include the WESP header. This has been done to counter certain attacks,
>but it means that WESP is no longer a simple wrapper around ESP - ESP
>itself is modified. Do you support this design decision?
>
>- The current draft allows WESP to be applied to encrypted ESP flows, in
>addition to the originally specified ESP-null. This was intended so that
>encrypted flows can benefit from the future extensibility offered by
>WESP. But arguably, it positions WESP as an alternative to ESP. Do you
>support this design decision?
>
>Thanks,
>     Yaron
>_______________________________________________
>IPsec mailing list
>IPsec@ietf.org
>https://www.ietf.org/mailman/listinfo/ipsec
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to