Hi Steve According to me IPSEC/IKE should have intelligence by by-pass ND Traffic
when SA is not ready state without end-user intervention, and same should be accepted by other end. If some vendor/Product may ask user to add specific rules in SDP to by- pass ND traffic, it is unto, his own choice. According to me their should one Guidelines in RFC, Control packet like ND, can go without IPSEC Encapsulation, even if SDP Matches. With Regards Syed Ajim -----Original Message----- From: Stephen Kent [mailto:k...@bbn.com] Sent: Saturday, February 20, 2010 9:52 PM To: Syed Ajim Hussain Cc: ipsec@ietf.org Subject: Re: [IPsec] IKE6 Negitaion when Peer Address ND not yet started. At 10:00 AM +0530 2/19/10, Syed Ajim Hussain wrote: >Hi Yoav Nir & All Group Member > > Thanks for your quick response. I think, instead of user takes special > care by adding extra Rule to allow un-encrypted ND traffic(unicast) , > There should be some RFC guidelines, such that IPSEC/IKE protocol itself > can take care. It will be problem in Interop also. > > Below guidelines can be used. > > 1. if packet is of IPv6 NS/NA types , IPSEC Policy matches , but > Security Association(SA ) not yet established , then send can send > Un- encrypted packets. > > Also Receiver should accept an un-encrypted packet for NS/NA when > IPsec policy matches But No Security Association(SA) presents. > > >With Regards >Syed Ajim > Syed, We don't generally provide exceptions for control traffic to cross the IPsec boundary. Note the extensive discussion in 4301 on ICMP traffic. What you described above is a policy decision and it needs to be explicitly stated in the SPD. At most we might remind folks to configure such SPD entries in an IPv6 environment. Steve _______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec