Hi Yoav Nir & All Group Member 

   Thanks for your quick response. I think, instead of user takes special 
   care by adding extra Rule to allow un-encrypted ND traffic(unicast) , 
   There should be some RFC guidelines, such that IPSEC/IKE protocol itself 
   can take care.  It will be problem in Interop also.

   Below guidelines can be used. 

   1. if packet is of IPv6 NS/NA types , IPSEC  Policy matches , but 
      Security Association(SA ) not yet established , then send can send  
      Un- encrypted packets. 

      Also Receiver should accept an un-encrypted packet for  NS/NA when 
      IPsec policy  matches But  No Security Association(SA) presents. 


With Regards
Syed Ajim      


    

   


****************************************************************************

This e-mail and attachments contain confidential information from HUAWEI,
which is intended only for the person or entity whose address is listed
above. Any use of the information contained herein in any way (including,
but not limited to, total or partial disclosure, reproduction, or
dissemination) by persons other than the intended recipient's) is
prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it!
****************************************************************************


 -----Original Message-----
From: Yoav Nir [mailto:y...@checkpoint.com] 
Sent: Thursday, February 18, 2010 2:35 PM
To: 'Syed Ajim Hussain'; ipsec@ietf.org
Subject: RE: [IPsec] IKE6 Negitaion when Peer Address ND not yet started.

Hi, Syed Ajim.

In future please expand acronyms, because while it's safe to assume that
anyone reading this list knows what an SA is, not all of us are proficient
in IPv6 terminology.

Having said that, policies usually have exceptions for protocols, that need
to run in the clear. IKE is an example of such a protocol. 

Also, when IPsec is between two hosts that are not on the same subnet, you
don't have a problem - since your local network is not in the policy, all
the neighbor discovery/solicitation/advertisement are in the clear anyway.

You do have a problem when your IPsec peer is on the same subnet. In that
case, you need to have an exception in your policy, that makes these
protocols non-protected. Alternatively, you can get the peer address from a
third party (such as DNS), and use that for IKE, ignoring the IPv6 way of
doing discovery. (IKE still needs an exception) Then the whole neighbor
protocols will run over IPsec like they should.  This might require some
messing around with the IPv6 stack.

-----Original Message-----
From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of
Syed Ajim Hussain
Sent: Thursday, February 18, 2010 10:41 AM
To: ipsec@ietf.org
Subject: [IPsec] IKE6 Negitaion when Peer Address ND not yet started.

Hi All

   IPv6 Peer1 ------------------ IPv6 Peer 2
     
   I have one question, for IKE IPv6 Solution.   
   Assume in  IPsec6 Policy I have configure Source IPv6 Address and 
   Destination IPv6 Address as Traffic selector, now IPSEC SA is not yet 
   establish.    
   When IKE Triggers, SA Negotiation and that time for peer address, ND not 
   yet done.
    
   In this condition, Initiator starts NS to resolve Peer Address,   
   Other end replies with NA, which is a Uncast packet   Now this unicast 
   packet is comes under IPsec6 policy, So Peer2 can not send it un-
   encrypted, and for encryption SA is not yet ready. 

   Even if Peer2 sends un-encrypted packets , this NA packet may drop in 
   Peer1, as it matches IPsec Policy and still packet is un-encrypted. 

   So, Is there any standard to handle such scenario? Else we need to 
   update standard to Support IPSEC6/IKE6.  

With Regards
Syed Ajim
    

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to