> On Dec 1, 2019, at 9:28 PM, Benjamin Kaduk <ka...@mit.edu> wrote:
> 
> On Sun, Dec 01, 2019 at 03:52:30AM -0500, Christian Hopps wrote:
>> I think it's important for this discussion to recognize that we have 2 
>> orthogonal issues.
>> 
>> 1) How does IP-TFS work on the wire with IPsec/ESP - this is where we need 
>> to make sure we don't unnecessarily restrict uni-directional use.
>> 
>> 2) What are the changes to IKEv2 to support IP-TFS - this is where we need 
>> to decided if we need the ability to negotiate uni-direction cases, we don't 
>> believe we need to do this. I think this is inline with what people are 
>> expecting here (i.e., a pair of SAs with IP-TFS enabled or not).
>> 
>> More inline..
>> 
>>> On Dec 1, 2019, at 2:41 AM, Paul Wouters <p...@nohats.ca> wrote:
>>> 
>>> On Fri, 29 Nov 2019, Christian Hopps wrote:
>>> 
>>> It seems unwise to protect traffic one way but not the other way. Are
>>> endusers really able to make the right decision based on their generated
>>> traffic? If you are that hungry for resources, perhaps this isn't an
>>> option for you to use?
>> 
>> There is no traffic to protect in the reverse direction. Consider telemetry 
>> where one is simply sending un-acked UDP data using to monitors.
> 
> I feel like I must be missing something; if there's no traffic in the
> reverse direction why does it matter if we assign semantics to the reverse
> SA or not?

B/c an IP-TFS enabled SA is sending a constant stream of packets either filled 
with the actual traffic or pad if no data is available.

Thanks,
Chris.

> 
> -Ben

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to