I suppose you could try to add a "we're exempt from 8200" paragraph and see
what happens.

You could also just say that ASBRs are presumed to be communicating within
a well-managed environment, are often zero or one hops away from one
another, and that this environment MUST accommodate the larger MTU for
tunnel-mode IPsec encapsulation.

On Thu, Oct 20, 2022 at 7:47 AM Ben Schwartz <bem...@google.com> wrote:

> The RISAV-AH header is inserted as the packet exits the source AS, and
> removed as the packet enters the destination AS.  Thus, it has the same net
> effect as an ESP tunnel, and IMHO should not be viewed as a violation of
> RFC 8200.
>
> Where this gets interesting is ICMP responses from intermediary routers
> (e.g. traceroute, PMTUD).  I'm not sure what to do about this, but I guess
> it's probably not worse than what would happen with an ESP tunnel...
>
> On Thu, Oct 20, 2022 at 10:41 AM Erik Kline <ek.i...@gmail.com> wrote:
>
>> I don't understand how "transport mode" can work for non-originated
>> packets; for IPv6, inserting random headers along the path would violate
>> 8200.
>>
>> On Thu, Oct 20, 2022 at 7:23 AM Ben Schwartz <bemasc=
>> 40google....@dmarc.ietf.org> wrote:
>>
>>> Hello IPSEC,
>>>
>>> We've just put out an extensively revised version of our RISAV proposal
>>> (the I stands for IPsec).  We'd like to start getting feedback from the
>>> IPsec experts.  We're also hoping to present this idea and solicit feedback
>>> at IETF 115.
>>>
>>> This is an early stage proposal with a lot of open questions (many of
>>> which are noted in the draft), but the core idea is simple: use RPKI to
>>> bootstrap an authenticated IPsec association between the source and
>>> destination ASes of Internet traffic, so that inauthentic packets can be
>>> discarded before they reach their destination.
>>>
>>> --Ben Schwartz
>>>
>>> ---------- Forwarded message ---------
>>>
>>> A new version of I-D, draft-xu-risav-02.txt
>>> has been successfully submitted by Benjamin Schwartz and posted to the
>>> IETF repository.
>>>
>>> Name:           draft-xu-risav
>>> Revision:       02
>>> Title:          An RPKI and IPsec-based AS-to-AS Approach for Source
>>> Address Validation
>>> Document date:  2022-10-20
>>> Group:          Individual Submission
>>> Pages:          17
>>> URL:            https://www.ietf.org/archive/id/draft-xu-risav-02.txt
>>> Status:         https://datatracker.ietf.org/doc/draft-xu-risav/
>>> Html:           https://www.ietf.org/archive/id/draft-xu-risav-02.html
>>> Htmlized:       https://datatracker.ietf.org/doc/html/draft-xu-risav
>>> Diff:           https://www.ietf.org/rfcdiff?url2=draft-xu-risav-02
>>>
>>> Abstract:
>>>    This document presents RISAV, a protocol for establishing and using
>>>    IPsec security between Autonomous Systems (ASes) using the RPKI
>>>    identity system.  In this protocol, the originating AS adds
>>>    authenticating information to each outgoing packet at its Border
>>>    Routers (ASBRs), and the receiving AS verifies and strips this
>>>    information at its ASBRs.  Packets that fail validation are dropped
>>>    by the ASBR.  RISAV achieves Source Address Validation among all
>>>    participating ASes.
>>>
>>>
>>>
>>>
>>> The IETF Secretariat
>>>
>>>
>>> _______________________________________________
>>> IPsec mailing list
>>> IPsec@ietf.org
>>> https://www.ietf.org/mailman/listinfo/ipsec
>>>
>>
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to