Yaron,

On Tue, Jan 5, 2010 at 3:57 AM, Yaron Sheffer <yar...@checkpoint.com> wrote:
> Hi,
>
> We have had a few "discusses" during the IESG review of the WESP draft. To 
> help resolve them, we would like to reopen the following two questions to WG 
> discussion. Well reasoned answers are certainly appreciated. But plain "yes" 
> or "no" would also be useful in judging the group's consensus.
>
> - The current draft 
> (http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-11) defines 
> the ESP trailer's ICV calculation to include > the WESP header. This has been 
> done to counter certain attacks, but it means that WESP is no longer a simple 
> wrapper around > ESP - ESP itself is modified. Do you support this design 
> decision?

I had brought this up on the mailing list some time back that WESP now
is not a mere "wrapper" over the ESP and is almost like a new
protocol, which it anyways was designed to be. I dont see an issue
with that. I dont hold a very strong opinion on whether we should
include the WESP protocol header inside the ESP calculation or not and
am also fine with the end nodes just doing a sanity check to ensure
that things look alright when they receive the WESP protocol packets.

>
> - The current draft allows WESP to be applied to encrypted ESP flows, in 
> addition to the originally specified ESP-null. This was intended so that 
> encrypted flows can benefit from the future extensibility offered by WESP.

And i strongly agree with this. It would be severely limiting to see
WESP being only used for ESP-NULL cases. I see absolutely no harm in
using WESP for encrypted traffic too. I agree with others on the list
that by having WESP do encryption we provide the middle boxes with an
easy/deterministic way to discriminate between integrity protected and
encrypted packets, which is what we were chartered to do. I am not a
big fan of flow based devices as these get really too hot to handle in
scaled up networks and heuristics seems like a juvenile attempt at
solving the problem. There have been various mails in the past about
the issues in that scheme and i dont intend to rehash them here, so
i'll this here.

> But arguably, it positions WESP as an alternative to ESP.
>

It does not.

ESP still has its own place and i dont see how having WESP ship ESP
encrypted packets makes it a substitute of ESP. WESP will be required
in the environments wherever we require deep inspection while ESP will
continue where its not.

> Do you support this design decision?

Yes, i do.

Jack

>
> Thanks,
>     Yaron
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
>
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to