Hi Tero,

RFC 4555 Appendix A.2 has more text discussing this topic (when you
need to create a new ESP/AH SA, how do you know where to send the IKE
packets). It basically concluded this is beyond the scope of the spec,
and could be very simple (e.g. just configure a single IP address
somewhere), or quite complex (e.g. multiple gateways to select from).

So I think this is quite possible with RFC 4301 architecture...
(but probably not supported by all implementations)

Best regards,
Pasi

> -----Original Message-----
> From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf
> Of ext Tero Kivinen
> Sent: 28 January, 2010 14:18
> To: Eronen Pasi (Nokia-NRC/Helsinki)
> Cc: ipsec@ietf.org
> Subject: Re: [IPsec] RFC5555 and Section 2.23.1 (was: IKEv2bis,
> comments about sections 1-2)
> 
> pasi.ero...@nokia.com writes:
> > > -------------------------------------------------------------------
> ---
> > > 2.11.  Address and Port Agility
> > >
> > >    IKE runs over UDP ports 500 and 4500, and implicitly sets up ESP
> and
> > >    AH associations for the same IP addresses it runs over.
> > > -------------------------------------------------------------------
> ---
> > >
> > > which usually means that for transport mode the addresses you
> expect
> > > to se on ESP packets are same as what they were for the IKE packet
> > > too, which is impossible now as the IKEv2 runs over IPv4, but ESP
> > > packets run over IPv6.
> >
> > Hmm... What exactly that text means is actually a good question.
> > If you have a multi-homed host using SCTP, for example, it would make
> > sense to create a transport mode SA whose traffic selectors include
> > more than one IP address. If there are no NATs, this would work fine
> > (even though only one of the addresses in TS payloads would be equal
> > to the address used for sending the IKE packet).
> >
> > So I'm not so sure if this text really prohibits the situation where
> > transport mode traffic selectors aren't exactly the same as the
> > addresses used for sending the IKE packet...
> 
> I agree that it does not explictly forbid having multiple addresses in
> transport mode SA, but I do not think it is possible.
> 
> If we think this setup from the initiator point of view. He is sending
> packet from src1 to dst1. The packet will trigger IPsec negotiation
> which will then do SPD lookup. If entry is found from there, and this
> is transport mode then the SPD does not have local and remote tunnel
> addresses, but instead it assumes that src1 and dst1 are the address
> used when creating IKE (or selecting IKE).
> 
> How do you plan to create such things using RFC4301 architecture?
> 
> I do not think SPD have any other places to store that kind of
> information than in the local/remote tunnel addresses, and those are
> only used in tunnel mode:
> 
>                 - (if tunnel mode) local tunnel address -- For a
>                   non-mobile host, if there is just one interface, this
>                   is straightforward; if there are multiple
>                   interfaces, this must be statically configured.  For
> a
>                   mobile host, the specification of the local address
>                   is handled externally to IPsec.
>                 - (if tunnel mode) remote tunnel address -- There is no
>                   standard way to determine this.  See 4.5.3, "Locating
>                   a Security Gateway".
> 
> 
> Hmm.. it might be possible that if the PAD entry linked with that
> transport mode SPD contains "peer gateway information" field which
> indicates the security gateway, but the RFC4301 also says that:
> 
>    For example, assume that IKE A receives an outbound packet destined
>    for IP address X, a host served by a security gateway.  RFC 2401
>    [RFC2401] and this document do not specify how A determines the
>    address of the IKE peer serving X.
> 
> which would indicate that it might be possible to do this kind of
> things with RFC4301 architecture. On the other hand it is talking
> about security gateway, which usually indicates tunnel mode, as
> security gateway is defined to be:
> 
>        A security gateway is an intermediate system implementing
>    IPsec, e.g., a firewall or router that has been IPsec-enabled.
> 
> > Well, this is not the only place where RFC5555 may not work with just
> > any IPsec implementation, and can require MIP-specific tweaks...
> > (search for "implementation" in Section 5 if you really want to know)
> 
> I think knowledge adds pain, so I rather not... every time I try read
> those MIP specific tweaks my heads start hurting, and I feel that
> those tweaks are not going to work ever with any real IPsec
> implementation.
> 
> > > As there is no NAT for the IPv6 addresses, then the SPD lookup
> based
> > > on the traffic selectors would be fine, but there is no way to know
> > > whether there is NAT between the IPv6 address or not, as we only
> > > tested the presense of NAT for IPv4 addresses.
> >
> > Yes, that's true. (And even if you know there's NAT, you would not
> know
> > what the mapped addresses are.)
> 
> Yes.
> --
> kivi...@iki.fi
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to