Hi Paul,

My comment was only about using the next header field in ESP to identify the 
ESP payload. I believe we've already agreed to remove the zero-conf section as 
too controversial.

Tero, is suggesting that we should not use the next header field at all. That 
is what I don't understand.

Thanks,
Chris.

> On Oct 15, 2020, at 4:06 PM, Paul Wouters <p...@nohats.ca> wrote:
> 
> On Wed, 14 Oct 2020, Christian Hopps wrote:
> 
>> I really don't understand the extreme back pressure against using ESP the 
>> way it was designed. The next-header field is supposed to identify the 
>> payload, it does so for every other
>> payload ESP carries. Any other solution to somehow infer the payload type 
>> some other way *has* to be seen as a hack. Why do we need a hack?
>> The fact that using a payload identifier the way ESP intended also allows us 
>> to do things like handle receipt of said payload without extra 
>> configuration, or use the payload outside
>> of ESP are just benefits from good design, they aren't indicative of doing 
>> something incorrectly, the opposite in fact. They also shouldn't even be 
>> needed to justify using ESP the
>> way it was designed to be used.
>> This is all very strange to me, this want to not use the next-header field 
>> to, you know, identify the next header.
> 
> I see it as a useful feature that I can "enable" IPTFS on my existing
> IPsec connection dynamically. Perhaps to avoid always sending traffic
> when I have none, and mostly wanting my decoy traffic when I am doing
> things (like typing over ssh, sending an email, etc)
> 
> I don't see how this would happen "automatically". It would be a user
> invoked event.
> 
> Based on that, userland has to somehow trigger to kernel to switch from
> regular ESP to IPTFS. We would need to define that (eg via Netlink or
> PF_KEY).
> 
> But why not use a NOTIFY with a REKEY event to USE_IPTFS ? No need for
> new PF_KEY/netlink messages, no new userland <-> kernel signaling. Just
> use existing implemented IKE/IPsec protocols.
> 
> So I think I agree with Valery (and Tero). It is not really about what
> the ESP packet format can or cannot do, but using existing channels for
> on-the-fly reconfiguration. It would work the same as if you wanted to
> switch a transport mode to tunnel mode or IPCOMP, rekey with(out)
> USE_TRANSPORT or USE_IPCOMP.
> 
> Paul
> 

Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to