Dear All,
I need to clarify my question.
My question is about the way for initiator to complex the TS narrowed
by responder.
Suppose that following TSs are returned by the responder.
1) TSi = (TS1, TS2)
2) TSr = (TS3, TS4, TS5)
While complexing, the case TS1 and TS5 need to be removed by initiator
due to the difference of protocol ID and violation of the intended
policy.
Can initiator remove the above case and follow the RFC?
I'm looking forward to the experts' responses.
Thanks in advance.
From My iPhone
2010. 6. 20. 오후 2:36 Raj Singh <rsjen...@gmail.com> 작성:
Hi Jaemin,
If initiator narrows down the TSr, then
1. the responder is not aware of initiator has narrowed down TSr and
if it initiates a traffic which is from a broader section of range
which Initiator has not accepted, there will data black-hole.
2. I think, better solution will be, If initiator has to narrow down
the TSr, it can delete old Child SA and negotiate a new Child SA
based on knowledge of TSr that are acceptable to initiator as well
as responder.
Regards,
Raj
On Sat, Jun 19, 2010 at 11:15 PM, Jaemin Park <jmpar...@gmail.com>
wrote:
Hi, Scott,
I want to ask one more thing about Traffic Selector.
In my case, host A and host B are working as follows about Traffic
Selector :
1) host A (initiator) sends TS to host B (responder)
2) host B narrows the TS sent by host A and responses the narrowed
TS to host A
At this point, the narrowed TS includes the TSs that violates the
policy of initiator such as different protocol IDs of TSi and TSr,
etc.
Then, can host A (initiator) also narrow the narrowed TSs, that is
to remove the case of which the protocol IDs are different?
I'm looking forward to responses.
Thanks in advance.
My Best Regards,
Jaemin Park
On Sat, Jun 19, 2010 at 12:07 AM, Scott C Moonen
<smoo...@us.ibm.com> wrote:
Hi Jaemin,
The RFC allows you to narrow the proposed traffic selectors to
something smaller than what the peer proposes. From your
description, it sounds like StrongSwan has made a pragmatic choice
to narrow the proposed selectors to something symmetrical. This is
allowed by the RFC. The TCP&UDP case is a strange one, and in
particular it doesn't accomplish much for TCP, but it is allowed by
the RFC. If your SPD and/or SAD pragmatically do not allow you to
express this sort of asymmetry for IPsec-protected traffic, then it
is proper for you to respond with TS_UNACCEPTABLE to such a
proposal. You will of course be unable to interoperate with a peer
making such a proposal, but in this case I'm not sure that is a
great hardship.
Also don't forget to take into account complex proposals containing
more than one traffic selector for TSi and/or TSr.
Scott Moonen (smoo...@us.ibm.com)
z/OS Communications Server TCP/IP Development
http://www.linkedin.com/in/smoonen
<graycol.gif>Jaemin Park ---06/18/2010 10:51:53 AM---Dear All,
<ecblank.gif>
From: <ecblank.gif>
Jaemin Park <jmpar...@gmail.com>
<ecblank.gif>
To: <ecblank.gif>
ipsec@ietf.org
<ecblank.gif>
Date: <ecblank.gif>
06/18/2010 10:51 AM
<ecblank.gif>
Subject: <ecblank.gif>
[IPsec] Complexing of Traffic Selector (TSi & TSr)
Dear All,
I'm in charge of developing VPN Clients based on IKEv2 and IPSec.
We referred to the implementation of strongswan and RFC documents
such as 4306 and 4718.
While developing, we faced one question about complexing of Traffic
Selectors.
According to the RFC 4718, complexing of TSi and TSr which have same
protocol IDs are defined and clarified.
However, in the case when TSi is (17 (udp) any any) and TSr is (ip
any any) where protocol IDs are different, should VPN complex TSi
and TSr?
According to the implementation of strongswan, we could find the
fact that the strongswan is checking when complexing the TSi and TSr
as follows :
1) remove the policy which has different protocol IDs for TSi and
TSr as long as both of them are not "ANY"
2) follow the protocol which is not "ANY" if one of TSi and TSr is
"ANY"
According to my analysis, following examples can be possible :
- ANY & ANY yields ANY
- ANY & UDP yields UDP
- UDP & UDP yields UDP
- TCP & UDP <-- remove this case
Does above implementation of strongswan follow the standards?
If so, we're planning to implement the way the strongswan supports.
I'm looking forward to all of the experts' responses.
My Best Regards,
Jaemin Park
--
Park, Jae Min
Assistant Manager
Device R&D Center , Convergence WIBRO BU, KT
M : +82-10-3010-2658
T : +82-2-2010-9255
jmp...@kt.com,
jmpar...@gmail.com_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec
--
Park, Jae Min
Assistant Manager
Device R&D Center , Convergence WIBRO BU, KT
M : +82-10-3010-2658
T : +82-2-2010-9255
jmp...@kt.com, jmpar...@gmail.com
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec