Erik Kline writes:
> <snip>
>  
> 
>     > I.e., either this document needs to formally update RFC 4303 by allowing
>     any
>     > number or another IP protocol number must be requested to the IANA.
>    
>     As I pointed out in my previous email that is not the case.
>    
>     The RFC4303 ESP has a Next Header field which contains indicates what
>     type of packet is inside the ESP packet. It typically contains IP
>     Protocol Numbers, but not always. Thats why the RFC4303 above says
>     "chosen from the set of IP Protocol Numbers".
> 
> I disagree.  4303 S2.6 is very clearly talking about the Protocol Numbers
> registry (the example of "41 means IPv6" is one of the things that give it
> away).

Note that IP Protocol value 41 for ESP does NOT MEAN same thing than
what is described in the RFC 2473. The payload format of the ESP is
different than what is described in that RFC. ESP Tunnel mode adds
other pieces to the packet in different locations.

The reason 41 (and 4) where chosen to match the ESP Tunnel mode is
because they do have similar use than ESP Tunnel mode, but the actual
protocols are different. 

> I think this document needs to request a protocol number from IANA.

That would be one option, but then there might be issues where
someone actually tries to use this outside the ESP, and because the
current specification requires things to be negotiated in the IKEv2,
this is not really possible, and using this outside ESP will also
break the traffic flow confidentiality completely as there is no
encryption of the traffic.

We could also say that if the USE_AGGFRAG is negotiated for the Child
SA (ESP SA) then Next header field is ignored on recipient, and sent
as zeros, and all packets inside the Child SA are going to use
AGGFRAG_PAYLOAD format. We do loose some information that would be
helpful when debugging configuration issues, but the protocol would
still work. It would also made it harder to do future enhancements to
this protocol.
-- 
kivi...@iki.fi

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to