Hi Jaemin,

The problem is at initiator side, when its sending its TSi/TSr, it sending
some range which is violating its own policies. This is not allowed by RFC
as per section 2.9.1.

Regards,
Raj


2010/6/20 Jaemin Park <jmpar...@gmail.com>

> Dear All,
>
> I need to clarify my question.
> My question is about the way for initiator to complex the TS narrowed by
> responder.
>
> Suppose that following TSs are returned by the responder.
>
> 1) TSi = (TS1, TS2)
> 2) TSr = (TS3, TS4, TS5)
>
> While complexing, the case TS1 and TS5 need to be removed by initiator due
> to the difference of protocol ID and     violation of the intended policy.
>
> Can initiator remove the above case and follow the RFC?
>
> I'm looking forward to the experts' responses.
>
> Thanks in advance.
>
> From My iPhone
>
> 2010. 6. 20. 오후 2:36 Raj Singh <rsjen...@gmail.com> 작성:
>
> Hi Jaemin,
>
> If initiator narrows down the TSr, then
> 1. the responder is not aware of initiator has narrowed down TSr and if it
> initiates a traffic which is from a broader section of range which Initiator
> has not accepted, there will data black-hole.
> 2. I think, better solution will be, If initiator has to narrow down the
> TSr, it can delete old Child SA and negotiate a new Child SA based on
> knowledge of TSr that are acceptable to initiator as well as responder.
>
> Regards,
> Raj
>
>
> On Sat, Jun 19, 2010 at 11:15 PM, Jaemin Park < <jmpar...@gmail.com>
> jmpar...@gmail.com> wrote:
>
>> Hi, Scott,
>>
>> I want to ask one more thing about Traffic Selector.
>>
>> In my case, host A and host B are working as follows about Traffic
>> Selector :
>>
>> 1) host A (initiator) sends TS to host B (responder)
>> 2) host B narrows the TS sent by host A and responses the narrowed TS to
>> host A
>>
>> At this point, the narrowed TS includes the TSs that violates the policy
>> of initiator such as different protocol IDs of TSi and TSr, etc.
>> Then, can host A (initiator) also narrow the narrowed TSs, that is to
>> remove the case of which the protocol IDs are different?
>>
>> I'm looking forward to responses.
>>
>> Thanks in advance.
>>
>> My Best Regards,
>> Jaemin Park
>>
>> On Sat, Jun 19, 2010 at 12:07 AM, Scott C Moonen < <smoo...@us.ibm.com>
>> smoo...@us.ibm.com> wrote:
>>
>>>  Hi Jaemin,
>>>
>>> The RFC allows you to narrow the proposed traffic selectors to something
>>> smaller than what the peer proposes. From your description, it sounds like
>>> StrongSwan has made a pragmatic choice to narrow the proposed selectors to
>>> something symmetrical. This is allowed by the RFC. The TCP&UDP case is a
>>> strange one, and in particular it doesn't accomplish much for TCP, but it is
>>> allowed by the RFC. If your SPD and/or SAD pragmatically do not allow you to
>>> express this sort of asymmetry for IPsec-protected traffic, then it is
>>> proper for you to respond with TS_UNACCEPTABLE to such a proposal. You will
>>> of course be unable to interoperate with a peer making such a proposal, but
>>> in this case I'm not sure that is a great hardship.
>>>
>>> Also don't forget to take into account complex proposals containing more
>>> than one traffic selector for TSi and/or TSr.
>>>
>>>
>>> Scott Moonen ( <smoo...@us.ibm.com>smoo...@us.ibm.com)
>>> z/OS Communications Server TCP/IP Development
>>> <http://www.linkedin.com/in/smoonen>http://www.linkedin.com/in/smoonen
>>>
>>> <graycol.gif>Jaemin Park ---06/18/2010 10:51:53 AM---Dear All,
>>>
>>>   <ecblank.gif>
>>> From: <ecblank.gif>
>>>
>>> Jaemin Park < <jmpar...@gmail.com>jmpar...@gmail.com>
>>>  <ecblank.gif>
>>> To: <ecblank.gif>
>>> <ipsec@ietf.org>ipsec@ietf.org <ecblank.gif>
>>> Date: <ecblank.gif>
>>>
>>> 06/18/2010 10:51 AM
>>>  <ecblank.gif>
>>> Subject: <ecblank.gif>
>>>
>>> [IPsec] Complexing of Traffic Selector (TSi & TSr)
>>> ------------------------------
>>>
>>>
>>>
>>> Dear All,
>>>
>>> I'm in charge of developing VPN Clients based on IKEv2 and IPSec.
>>>
>>> We referred to the implementation of strongswan and RFC documents such as
>>> 4306 and 4718.
>>>
>>> While developing, we faced one question about complexing of Traffic
>>> Selectors.
>>> According to the RFC 4718, complexing of TSi and TSr which have same
>>> protocol IDs are defined and clarified.
>>> However, in the case when TSi is (17 (udp) any any) and TSr is (ip any
>>> any) where protocol IDs are different, should VPN complex TSi and TSr?
>>> According to the implementation of strongswan, we could find the fact
>>> that the strongswan is checking when complexing the TSi and TSr as follows :
>>> 1) remove the policy which has different protocol IDs for TSi and TSr as
>>> long as both of them are not "ANY"
>>> 2) follow the protocol which is not "ANY" if one of TSi and TSr is "ANY"
>>> According to my analysis, following examples can be possible :
>>> - ANY & ANY yields ANY
>>> - ANY & UDP yields UDP
>>> - UDP & UDP yields UDP
>>> - TCP & UDP <-- remove this case
>>>
>>> Does above implementation of strongswan follow the standards?
>>> If so, we're planning to implement the way the strongswan supports.
>>>
>>> I'm looking forward to all of the experts' responses.
>>>
>>> My Best Regards,
>>> Jaemin Park
>>>
>>> --
>>> Park, Jae Min
>>> Assistant Manager
>>> Device R&D Center , Convergence WIBRO BU, KT
>>> M : +82-10-3010-2658
>>> T  : +82-2-2010-9255  *
>>> *
>>> *jmp...@kt.com* <jmp...@kt.com>, *jmpar...@gmail.com*<jmpar...@gmail.com>
>>> _______________________________________________
>>> IPsec mailing list
>>> <IPsec@ietf.org>IPsec@ietf.org
>>> <https://www.ietf.org/mailman/listinfo/ipsec>
>>> https://www.ietf.org/mailman/listinfo/ipsec
>>>
>>>
>>>
>>
>>
>> --
>> Park, Jae Min
>> Assistant Manager
>> Device R&D Center , Convergence WIBRO BU, KT
>> M : +82-10-3010-2658
>> T  : +82-2-2010-9255
>> <jmp...@kt.com>jmp...@kt.com, <jmpar...@gmail.com>jmpar...@gmail.com
>>
>> _______________________________________________
>> IPsec mailing list
>>  <IPsec@ietf.org>IPsec@ietf.org
>>  <https://www.ietf.org/mailman/listinfo/ipsec>
>> https://www.ietf.org/mailman/listinfo/ipsec
>>
>>
>
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to