<SNIP!>

> Transport policies for within an organization that want to enable
> intermediary inspection of ESP-NULL non-heurisitically.  Organization has a
> mix of version of systems.

At this point I need more details.  Specifically, why does an organization
need to inspect ESP-NULL packets?  I can think of two good reasons off the
top of my head:

        * To appropriately schedule or forward a packet according to latency,
          or any other number of diffserv properties.

        - Deep-packet inspection for content or other beyond-the-headers
          processing.

I've marked the first item with *, and the second with -.

Items marked with * merely requires flow classification.  In IPv6 we have a
flow id already, and there are rumblings of a hop-by-hop IPv4 option to do
the same thing here:

        http://tools.ietf.org/html/draft-dreibholz-ipv4-flowlabel-11

(Heck, it's even 20 bits!)

Items marked with - require that the payload be in the clear, or (by some
miracle) the inspecting entity has the cryptographic keys.

Items marked with * can use flow labels.  Yes it's a host software change,
but quite frankly so is WESP.  WESP doesn't do anything in this case an
alternate mechanism cannot do.

Items marked with - will benefit greatly from WESP IF (and only if) you
believe heuristics to be untenable, but encrypted WESP support won't help
here at all.  Furthemore, a working flow label deployment and flow labelling
policy could make what were heuristics into completely deterministic
processing.

There's vague talk about deployability and future directions.  Please show me
some concrete examples supporting WESP with encrypted packet support.  I
suspect such examples will most likely either require the whole packet text
(i.e. marked with -) or just enough data to identify a flow (i.e. marked with
*).

Thanks,
Dan
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to