Hi Jaemin,

If initiator narrows down the TSr, then
1. the responder is not aware of initiator has narrowed down TSr and if it
initiates a traffic which is from a broader section of range which Initiator
has not accepted, there will data black-hole.
2. I think, better solution will be, If initiator has to narrow down the
TSr, it can delete old Child SA and negotiate a new Child SA based on
knowledge of TSr that are acceptable to initiator as well as responder.

Regards,
Raj


On Sat, Jun 19, 2010 at 11:15 PM, Jaemin Park <jmpar...@gmail.com> wrote:

> Hi, Scott,
>
> I want to ask one more thing about Traffic Selector.
>
> In my case, host A and host B are working as follows about Traffic Selector
> :
>
> 1) host A (initiator) sends TS to host B (responder)
> 2) host B narrows the TS sent by host A and responses the narrowed TS to
> host A
>
> At this point, the narrowed TS includes the TSs that violates the policy of
> initiator such as different protocol IDs of TSi and TSr, etc.
> Then, can host A (initiator) also narrow the narrowed TSs, that is to
> remove the case of which the protocol IDs are different?
>
> I'm looking forward to responses.
>
> Thanks in advance.
>
> My Best Regards,
> Jaemin Park
>
> On Sat, Jun 19, 2010 at 12:07 AM, Scott C Moonen <smoo...@us.ibm.com>wrote:
>
>>  Hi Jaemin,
>>
>> The RFC allows you to narrow the proposed traffic selectors to something
>> smaller than what the peer proposes. From your description, it sounds like
>> StrongSwan has made a pragmatic choice to narrow the proposed selectors to
>> something symmetrical. This is allowed by the RFC. The TCP&UDP case is a
>> strange one, and in particular it doesn't accomplish much for TCP, but it is
>> allowed by the RFC. If your SPD and/or SAD pragmatically do not allow you to
>> express this sort of asymmetry for IPsec-protected traffic, then it is
>> proper for you to respond with TS_UNACCEPTABLE to such a proposal. You will
>> of course be unable to interoperate with a peer making such a proposal, but
>> in this case I'm not sure that is a great hardship.
>>
>> Also don't forget to take into account complex proposals containing more
>> than one traffic selector for TSi and/or TSr.
>>
>>
>> Scott Moonen (smoo...@us.ibm.com)
>> z/OS Communications Server TCP/IP Development
>> http://www.linkedin.com/in/smoonen
>>
>> [image: Inactive hide details for Jaemin Park ---06/18/2010 10:51:53
>> AM---Dear All,]Jaemin Park ---06/18/2010 10:51:53 AM---Dear All,
>>
>>
>> From:
>> Jaemin Park <jmpar...@gmail.com>
>> To:
>> ipsec@ietf.org
>> Date:
>> 06/18/2010 10:51 AM
>> Subject:
>> [IPsec] Complexing of Traffic Selector (TSi & TSr)
>> ------------------------------
>>
>>
>>
>> Dear All,
>>
>> I'm in charge of developing VPN Clients based on IKEv2 and IPSec.
>>
>> We referred to the implementation of strongswan and RFC documents such as
>> 4306 and 4718.
>>
>> While developing, we faced one question about complexing of Traffic
>> Selectors.
>> According to the RFC 4718, complexing of TSi and TSr which have same
>> protocol IDs are defined and clarified.
>> However, in the case when TSi is (17 (udp) any any) and TSr is (ip any
>> any) where protocol IDs are different, should VPN complex TSi and TSr?
>> According to the implementation of strongswan, we could find the fact that
>> the strongswan is checking when complexing the TSi and TSr as follows :
>> 1) remove the policy which has different protocol IDs for TSi and TSr as
>> long as both of them are not "ANY"
>> 2) follow the protocol which is not "ANY" if one of TSi and TSr is "ANY"
>> According to my analysis, following examples can be possible :
>> - ANY & ANY yields ANY
>> - ANY & UDP yields UDP
>> - UDP & UDP yields UDP
>> - TCP & UDP <-- remove this case
>>
>> Does above implementation of strongswan follow the standards?
>> If so, we're planning to implement the way the strongswan supports.
>>
>> I'm looking forward to all of the experts' responses.
>>
>> My Best Regards,
>> Jaemin Park
>>
>> --
>> Park, Jae Min
>> Assistant Manager
>> Device R&D Center , Convergence WIBRO BU, KT
>> M : +82-10-3010-2658
>> T  : +82-2-2010-9255  *
>> *
>> *jmp...@kt.com* <jmp...@kt.com>, *jmpar...@gmail.com*<jmpar...@gmail.com>
>> _______________________________________________
>> IPsec mailing list
>> IPsec@ietf.org
>> https://www.ietf.org/mailman/listinfo/ipsec
>>
>>
>>
>
>
> --
> Park, Jae Min
> Assistant Manager
> Device R&D Center , Convergence WIBRO BU, KT
> M : +82-10-3010-2658
> T  : +82-2-2010-9255
> jmp...@kt.com, jmpar...@gmail.com
>
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
>
>

<<ecblank.gif>>

<<graycol.gif>>

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to