Grewal, Ken writes:
> Some people have jumped to conclusions that because we want to
> differentiate between encrypted and non-encrypted traffic by
> explicitly signaling in the packet, that WESP is now a replacement
> for ESP. 
>
> THIS IS NOT THE CASE AND IT WAS NEVER THE INTENT! 

That is true, it was never intented for that, but some of the comments
in the list (and in the last IETF meeting) started discussions which
started to lead that way.

This includes most of the WESP extension discussion. That discussion
was the thing that woke me up, and then I started to notice that the
WESP is very far from where it started.

Even when most of the intermediate steps were justifiable, that does not
mean the end result will be ok.

> One item that may have led to this conclusion was the expanded ICV
> over WESP, but this was introduced as a mitigation for certain
> threats highlighted in the WG. Subsequent discussions have
> determined that it would be better to mitigate these treats in an
> alternative manner, so we can fall back to WESP being a wrapper for
> ESP, without the expanded ICV. Wrapped ESP provides a wrapper for
> ESP!

The current draft still requires both checks, i.e. both ICV to cover
the WESP header, AND checking all fields in the WESP header against
other sources. I think the checking and ICV expansion happeneded about
in the same time, and one of the reasons the checking of the fields is
needed REGARDLESS whether ICV covers WESP header or not, is to protect
against attacks where the end node puts wrong values to the WESP
header to fool intermediate devices.

ICV cannot protect against that. ICV will only protect against the
attacks happening in transit, but checking all fields protects both
for attacks happening in transit, and attacks done by the end node. 

> Some argue that we should use WESP for NULL traffic, mandating ESP
> for encrypted traffic...AND ensure that ESP is NEVER used for NULL
> encryption within a given domain / environment. How does an
> intermediate device know that this policy is being enforced?

It cannot, but on the other hand how can intermediate device know that
the traffic which must be sent using ESP-NULL is not encrypted?

Only way to do either of those, is to mandate them by policy, which do
require co-operation from end point(s). 

> Having the encrypted flag within WESP allows clear and explicit
> distinction that certain traffic is encrypted whereas other traffic
> is not. This preserves the network based services we rely on and
> also allows other access control policies to be enforced. E.g. I
> want to ensure that my finance data flowing in the network is
> encrypted and NOT using ESP-NULL. If I rely on ESP for encrypted
> data and it can still use NULL encryption, I cannot enforce such a
> policy from an access control tool.

If you mandate that ESP is only for encrypted data, then you make
policy which says that ESP is only for encrypted data, and thats it.

If you cannot rely your end nodes to select correct policy between
WESP-NULL and encrypted ESP, how can you rely them selecting correct
policy for WESP-NULL vs encrypted-WESP traffic?

I.e. your node can still use WESP-NULL for financial data or it can
use encrypted WESP for traffic which should have been been using NULL
cipher.

> "A standards-track mechanism that allows an intermediary device, such
> as a firewall or intrusion detection system, to easily and reliably
> determine whether an ESP packet is encrypted with the NULL cipher; and
> if it is, determine the location of the actual payload data inside the
> packet."
> 
> If we say that WESP is ONLY used to carry ESP-NULL (and ESP is used
> to carry encrypted traffic, but based on the ESP spec and legacy, it
> may also carry ESP-NULL), then we have not completed what we set out
> to do, as we have failed to *reliably* determine if the ESP traffic
> is encrypted or not!

You can still use heuristics in that case, if you cannot update all
your hosts which use NULL cipher to use WESP. Heuristics can also
provide *reliable* way to determine whether traffic is encrypted ESP
or not. That is why we have both heuristics and WESP. Heuristics are
meant to be used in the mean time when not all traffic cannot be made
to use WESP-NULL. After the whole network supports WESP-NULL you can
forbid ESP-NULL by policy and drop heuristics.
-- 
kivi...@iki.fi
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to