Gabriel Montenegro wrote:

> Just to be clear: I'm not saying that WESP is a general replacement for ESP. 
> As Steve Kent points out, where there are no trusted intermediary inspection 
> devices (i.e., outside of medium to large organizations) there is no need
> for  end-nodes to collaborate with the inspecting infrastructure, hence no
> need for WESP. ESP is fine. Perhaps this is the disconnect that is happening: 
> traditionally, the focus of the IPsec WG has been on such external 
> applications
> (VPN), whereas WESP and future potential extensibility is more valuable 
> within 
> organizations. Such value may not be as obvious to VPN folks.
 
This sounds like an argument for being able to strip off the internal network 
WESP header at a perimeter intermediate system. That same perimeter box can 
apply Tero's heuristics and then add the header for so the intermediate systems 
don't need to. Voila, instant upgrade value for the VPN folks.

Which, of course, would not be possible with the ICV over the WESP header.

On the other hand, I don't really buy the 'slippery slope' arguments. I have 
read the charter for this work item over a couple of times and WESP with 
encryption still looks consistent to me.

So, here's my opinion:

- YES on allowing use of WESP when using ESP with encryption

- NO on including the WESP header in the ICV calculation, the endpoints have to 
deal with attacks in any case.

By the way, WESP extension drafts that propose arbitrary new mutable fields for 
use with ESP just reinforce that NO. 

Thanks,
--Joe
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to