At 5:42 PM +0000 1/6/10, Brian Swander wrote:
The uplevel machines can't use ESP to send the encrypted traffic in this scenario. Remember, that we need to look at the holistic scenario of how to deploy this in an environment where we have legacy machines that don't do WESP. And we need to satisfy the goal of deterministic intermediary visibility.

Hence, the best method I see is what I describe below. The non-WESP machines MUST do ESP-NULL to allow visibility. That means uplevel machines cannot use ESP to send encrypted, since otherwise intermediaries would see both ESP-NULL, and ESP, and be forced back to heuristics. Intermediaries would be configured (in this scenario) to assume that ESP always means ESP-NULL.

bs

Sorry, Brian, I still don't understand the scenario. Let's see if a detailed analysis can help.

In a mixed environment, there are two classes of machines: WESP-capable and not. That yields 3 types of connections, and 6 types of flows. Let's label end systems (nodes) as W (for WESP-capable) and N (for not WESP-capable), and label traffic as I (integrity protected, but not encrypted) and E (for encrypted). Finally, label the protocols as W (WESP), W* (WESP with the encrypted content flag set), EE (ESP-encrypted) and EN (ESP-NULL). The following table shows the flows and protocols that could result in 2 scenarios: Scenario 1 is WESP as originally proposed and Scenario 2 is with super-WESP.

Case    Nodes   Flow    S 1     S 2
1       N-N     I       EN      EN
2       N-N     E       EE      EE
3       W-W     I       W       W
4       W-W     E       EE      W*
5       W-N     I       EN      EN
6       W-N     E       EE      EE

The only place W* can be used is in case 4 (in Scenario 2), where both nodes are WESP-capable and the traffic is encrypted. But, in both scenarios, an intermediate device will encounter ESP traffic that may or may not be encrypted, in cases 1, 2, 5, and 6. So, it appears to me that the intermediate device needs to use heuristics until there are NO non-WESP nodes. At that time, we are dealing only with cases 3 & 4. But, in either scenario, these two cases present an intermediate device with unambiguous info for deciding whether a packet can be inspected.

This analysis suggests that there is no need for the flag when all nodes are WESP-capable, and no benefit when there are a mix of WESP-capable and legacy nodes.

Steve
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to