What is intended is that an implementation can process inbound IPTFS payloads 
w/o actually explicitly configuring the inbound SA to be in "IPTFS-mode" 
(zero-conf). That is all.

Thanks,
Chris.

> On Oct 14, 2020, at 4:01 AM, Valery Smyslov <smyslov.i...@gmail.com> wrote:
> 
> HI Chris,
> 
>> Indeed, this isn't about switching a pair of SAs to IPTFS in the middle of 
>> the tunnel operation. This is only
>> about supporting the receipt of IPTFS as a payload in ESP.
> 
> I admit, that English is not my native language :-), but the text in the 
> draft in my reading
> suggests exactly what you write it is not suggesting - switching to IP-TFS in 
> the middle of tunnel operation
> ("on receipt of the first IP-TFS payload"):
> 
> 2.4.  Zero-Conf Receive-Side Operation On The SA.
> 
>   Receive-side operation of IP-TFS does not require any per-SA
>   configuration on the receiver; as such, an IP-TFS implementation
>   SHOULD support the option of switching to IP-TFS receive-side
>   operation on receipt of the first IP-TFS payload.
> 
> If you intention was to require that all implementations SHOULD just support 
> receiving IP-TFS packets
> (say, should implement IP-TFS), then the requirement is strange for me -
> in fact you require that all implementations support this extension.
> 
> So, if you really meant some other thing, then the current text
> must be completely rewritten, so that it is clear for non-native readers 
> (like me).
> 
> Regards,
> Valery.
> 
>> Zero conf (or globally config enabled) receive support of IPTFS payloads is 
>> seen by some as a real value add.
>> I'm not sure what the kerfuffle is all about. :)
>> 
>> Thanks,
>> Chris.
>> 
>>> On Oct 14, 2020, at 2:58 AM, Valery Smyslov <smyslov.i...@gmail.com> wrote:
>>> 
>>> Hi Tero,
>>> 
>>>>> I'm not advocating ike vs ike-less, just trying to have a comprehensive
>>>>> solution.  One example ikeless usecase is captured by the YANG model in
>>>>> last call:
>>>>> https://tools.ietf.org/html/draft-ietf-i2nsf-sdn-ipsec-flow-protection-09
>>>> 
>>>> Which will require similar behavior from the IPsec part than IKE,
>>>> meaning you can't really change any parameters on the fly for existing
>>>> SAs. You can't change for example the ciphers of the existing SA, and
>>>> expect that to work.
>>> 
>>> In fact, unlike changing e.g. cipher on the fly, that is not possible,
>>> because the cipher used is not present in the ESP packet, so that you
>>> cannot distinguish two ESP packets with different ciphers, you can 
>>> distinguish
>>> tunnel packets from IPTFS packets on receiving side
>>> (by analyzing Next Header), so technically the proposed
>>> switching is workable. That said, I fully agree with you
>>> that it is a very bad idea and must be prohibited,
>>> at least for traditional IPsec.
>>> 
>>> I care less about other use cases (I recall that authors wanted
>>> to use IPTFS not only for IPsec, but as more generic
>>> mechanism to pack several IP packets into one). So, I may leave
>>> with this option if it will be explicitly prohibited
>>> for traditional IPsec. IKE-less (l2nsf) use case is a corner case,
>>> I tend to agree with you that it should be prohibited
>>> for this case too.
>>> 
>>> Regards,
>>> Valery.
>>> 
>>>> My understanding for that is that ike-less will not change any
>>>> parameters of the existing SAs in the SAD, as that would definitely
>>>> break everything, but instead they will allocate new SPI, install new
>>>> SAD entry, and then remove the old SAD entry which causes the traffic
>>>> move to use the newly created SAD entry.
>>>> 
>>>> So for that use, there is no point of having a way to turn on IPTFS in
>>>> the middle of SA use time, exactly as there is no need to try to
>>>> change algorithms of the existing SAs. If you do that kind of things,
>>>> you just create new SA, and delete old one. I am not sure whether this
>>>> should be reflected on the draft-ietf-i2nsf-sdn-ipsec-flow-protection
>>>> somehow, i.e., indicating that most (if not all) of the items in the
>>>> sad-entry are write once type of things, i.e., you can write them
>>>> once, but you can't modify them once they have been set, and only way
>>>> to change them is to delete the whole sad-entry and recreate it with
>>>> new values (most likely doing it other way round, i.e., first create
>>>> new and delete old).
>>>> --
>>>> kivi...@iki.fi
>>> 
> 
> 

Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to