Hi, Linda (et al.),

I’m not sure I get the whole thing, but (help me if I'm wrong), it seems like 
the point of this is:
a) there are stacks of protocols used for tunnels
b) it can be useful to protect just those added protocol layers (which for UDP 
would include the trailing options).

If so, it might be useful to make that more clear. It may also be useful to 
provide some info as to why protecting just these added layers is a win; a lot 
of times, the per-packet operations can be as significant as the per-byte 
operations, and removing some of the bytes - even the majority - might not be a 
big win. It’d be useful to provide evidence if so.

It does seem unclear as to what layer this operates, though. If it’s IP, it 
seems inappropriate to expect it to parse down into the transport metadata.

I would instead expect it the other way around - e.g., a variant of TCP-AO or 
UDP AUTH option that would cover the IP pseudoheader and transport headers, but 
not the transport payload. That could easily be defined as an 
endpoint-coordinated variant of either of those protocols, which don’t have 
in-band key/parameter negotiation for authentication anyway.

Joe

—
Dr. Joe Touch, temporal epistemologist
www.strayalpha.com

> On Oct 28, 2024, at 4:39 PM, Linda Dunbar <linda.dun...@futurewei.com> wrote:
> 
> Joe,
>  
> The primary scenario for the proposed authentication method is from 
> draft-ietf-rtgwg-multi-segment-sdwan
> where an additional header (GENEVE Encapsulation [RFC8926]) is added to the 
> encrypted payload to steer packets through underlay networks. In these 
> scenarios, the underlay network edge nodes do not decrypt and re-encrypt the 
> payloads. The header information is used for optimizing packet forwarding in 
> underlay networks and, therefore, resides outside the IPsec ESP header.
>  
> It was pointed out that UDP option header can also use this proposed approach.
>  
> We would like more feedback from the IPsecme community. 
>  
> Thanks, Linda
> From: Joe Touch <to...@strayalpha.com <mailto:to...@strayalpha.com>> 
> Sent: Monday, October 28, 2024 1:26 PM
> To: Linda Dunbar <linda.dun...@futurewei.com 
> <mailto:linda.dun...@futurewei.com>>
> Cc: Tero Kivinen <kivi...@iki.fi <mailto:kivi...@iki.fi>>; Yoav Nir 
> <ynir.i...@gmail.com <mailto:ynir.i...@gmail.com>>; ipsec@ietf.org 
> <mailto:ipsec@ietf.org>
> Subject: Re: [IPsec] Need 10 minutes slot at the IPsecme session
>  
> Do you mean UDP?
> 
> 
> On Oct 28, 2024, at 1:20 PM, Linda Dunbar <linda.dun...@futurewei.com 
> <mailto:linda.dun...@futurewei.com>> wrote:
> 
>  
> IPsecme Chairs, 
>  
> We would like a 10minutes slot at the IPsecme session in IETF 121 to discuss 
> this draft:
> https://datatracker.ietf.org/doc/draft-dunbar-secdispatch-ligthtweight-authenticate/
>  
> This document describes lightweight authentication methods to prevent 
> malicious actors tampering with the IP encapsulation headers or metadata 
> carried by the UPD Option Header.
>  
> We revised the draft to address comments and suggestion during the offline 
> discussion at IETF120. Would like to get more feedback from the IPsecme group 
> of the revision.
>  
> Thank you. 
>  
> Linda
>  
> _______________________________________________
> IPsec mailing list -- ipsec@ietf.org <mailto:ipsec@ietf.org>
> To unsubscribe send an email to ipsec-le...@ietf.org 
> <mailto:ipsec-le...@ietf.org>
_______________________________________________
IPsec mailing list -- ipsec@ietf.org
To unsubscribe send an email to ipsec-le...@ietf.org

Reply via email to