Indeed, this isn't about switching a pair of SAs to IPTFS in the middle of the 
tunnel operation. This is only about supporting the receipt of IPTFS as a 
payload in ESP.

Zero conf (or globally config enabled) receive support of IPTFS payloads is 
seen by some as a real value add. I'm not sure what the kerfuffle is all about. 
:)

Thanks,
Chris.

> On Oct 14, 2020, at 2:58 AM, Valery Smyslov <smyslov.i...@gmail.com> wrote:
> 
> Hi Tero,
> 
>>> I'm not advocating ike vs ike-less, just trying to have a comprehensive
>>> solution.  One example ikeless usecase is captured by the YANG model in
>>> last call:
>>> https://tools.ietf.org/html/draft-ietf-i2nsf-sdn-ipsec-flow-protection-09
>> 
>> Which will require similar behavior from the IPsec part than IKE,
>> meaning you can't really change any parameters on the fly for existing
>> SAs. You can't change for example the ciphers of the existing SA, and
>> expect that to work.
> 
> In fact, unlike changing e.g. cipher on the fly, that is not possible,
> because the cipher used is not present in the ESP packet, so that you
> cannot distinguish two ESP packets with different ciphers, you can distinguish
> tunnel packets from IPTFS packets on receiving side
> (by analyzing Next Header), so technically the proposed
> switching is workable. That said, I fully agree with you
> that it is a very bad idea and must be prohibited,
> at least for traditional IPsec.
> 
> I care less about other use cases (I recall that authors wanted
> to use IPTFS not only for IPsec, but as more generic
> mechanism to pack several IP packets into one). So, I may leave
> with this option if it will be explicitly prohibited
> for traditional IPsec. IKE-less (l2nsf) use case is a corner case,
> I tend to agree with you that it should be prohibited
> for this case too.
> 
> Regards,
> Valery.
> 
>> My understanding for that is that ike-less will not change any
>> parameters of the existing SAs in the SAD, as that would definitely
>> break everything, but instead they will allocate new SPI, install new
>> SAD entry, and then remove the old SAD entry which causes the traffic
>> move to use the newly created SAD entry.
>> 
>> So for that use, there is no point of having a way to turn on IPTFS in
>> the middle of SA use time, exactly as there is no need to try to
>> change algorithms of the existing SAs. If you do that kind of things,
>> you just create new SA, and delete old one. I am not sure whether this
>> should be reflected on the draft-ietf-i2nsf-sdn-ipsec-flow-protection
>> somehow, i.e., indicating that most (if not all) of the items in the
>> sad-entry are write once type of things, i.e., you can write them
>> once, but you can't modify them once they have been set, and only way
>> to change them is to delete the whole sad-entry and recreate it with
>> new values (most likely doing it other way round, i.e., first create
>> new and delete old).
>> --
>> kivi...@iki.fi
> 

Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to