Hi, Linda,

Notes below.

Joe

—
Dr. Joe Touch, temporal epistemologist
www.strayalpha.com

> On Nov 4, 2024, at 2:06 AM, Linda Dunbar <linda.dun...@futurewei.com> wrote:
> 
> Joe, 
>  
> Thank you very much for the comments. Please see below the detailed reply:
>  
> Linda
>  
> From: to...@strayalpha.com <mailto:to...@strayalpha.com> 
> <to...@strayalpha.com <mailto:to...@strayalpha.com>> 
> Sent: Thursday, October 31, 2024 12:31 AM
> To: Linda Dunbar <linda.dun...@futurewei.com 
> <mailto:linda.dun...@futurewei.com>>
> Cc: Tero Kivinen <kivi...@iki.fi <mailto:kivi...@iki.fi>>; Yoav Nir 
> <ynir.i...@gmail.com <mailto:ynir.i...@gmail.com>>; ipsec@ietf.org 
> <mailto:ipsec@ietf.org>
> Subject: Re: [IPsec] Need 10 minutes slot at the IPsecme session
>  
> Hi, Linda (et al.),
>  
> I’m not sure I get the whole thing, but (help me if I'm wrong), it seems like 
> the point of this is:
> there are stacks of protocols used for tunnels
> [Linda] “Stacks of Protocols”: do you mean layers of encapsulation headers on 
> the data plane?  Yes.
>  
> it can be useful to protect just those added protocol layers (which for UDP 
> would include the trailing options).
> [Linda] Correct. The document targets the protection of encapsulation headers 
> rather than the entire packet payload.
>  
> If so, it might be useful to make that more clear. It may also be useful to 
> provide some info as to why protecting just these added layers is a win; a 
> lot of times, the per-packet operations can be as significant as the per-byte 
> operations, and removing some of the bytes - even the majority - might not be 
> a big win. It’d be useful to provide evidence if so.
> [Linda] the payload is already encrypted. By focusing only on the 
> encapsulation headers, the authentication process is lighter, requiring fewer 
> computational resources. This is particularly advantageous in high-speed 
> networks or resource-constrained environments.

[JT] The assertion is clear, but evidence is what I suggested would be useful. 
Many security protocols have hardware acceleration that may not be able to 
identify and isolate headers (and, for UDP options, trailers). In other cases, 
per-packet operations may dominate vs. per byte costs. In either case, it would 
be useful to provide some evidence of this claim.

> It does seem unclear as to what layer this operates, though. If it’s IP, it 
> seems inappropriate to expect it to parse down into the transport metadata.
>  
> I would instead expect it the other way around - e.g., a variant of TCP-AO or 
> UDP AUTH option that would cover the IP pseudoheader and transport headers, 
> but not the transport payload. That could easily be defined as an 
> endpoint-coordinated variant of either of those protocols, which don’t have 
> in-band key/parameter negotiation for authentication anyway.
> [Linda] This is not a transport-layer solution like TCP-AO or UDP AUTH, which 
> would typically cover both the transport header and payload. Instead, it 
> complements these by providing lightweight authentication of the 
> encapsulation headers used in overlay or tunnel scenarios.

[JT] OSI protocol layer identifications are relative, not absolute (they always 
have been; we’ve been aware of this since the late 1990s). When TCP or UDP is 
used to encapsulate IP, those protocols act as link layers to that IP packet. 
TCP-AO and UDP AUTH both cover their layer’s endpoint association, which 
includes the TCP/UDP header/trailer and also the IP pseudoheader. In both 
cases, parameters are determined outside the protocol. Either could be defined 
with a parameter indicating the payload would be excluded from the 
authentication computation, just as TCP-AO-NAT (rfc 6978) does by excluding the 
source IP address and TCP port.

Joe

>  
> Joe
>  
> —
> Dr. Joe Touch, temporal epistemologist
> www.strayalpha.com <http://www.strayalpha.com/>
> 
> 
> On Oct 28, 2024, at 4:39 PM, Linda Dunbar <linda.dun...@futurewei.com 
> <mailto:linda.dun...@futurewei.com>> wrote:
>  
> Joe,
>  
> The primary scenario for the proposed authentication method is from 
> draft-ietf-rtgwg-multi-segment-sdwan
> where an additional header (GENEVE Encapsulation [RFC8926]) is added to the 
> encrypted payload to steer packets through underlay networks. In these 
> scenarios, the underlay network edge nodes do not decrypt and re-encrypt the 
> payloads. The header information is used for optimizing packet forwarding in 
> underlay networks and, therefore, resides outside the IPsec ESP header.
>  
> It was pointed out that UDP option header can also use this proposed approach.
>  
> We would like more feedback from the IPsecme community. 
>  
> Thanks, Linda
> From: Joe Touch <to...@strayalpha.com <mailto:to...@strayalpha.com>> 
> Sent: Monday, October 28, 2024 1:26 PM
> To: Linda Dunbar <linda.dun...@futurewei.com 
> <mailto:linda.dun...@futurewei.com>>
> Cc: Tero Kivinen <kivi...@iki.fi <mailto:kivi...@iki.fi>>; Yoav Nir 
> <ynir.i...@gmail.com <mailto:ynir.i...@gmail.com>>; ipsec@ietf.org 
> <mailto:ipsec@ietf.org>
> Subject: Re: [IPsec] Need 10 minutes slot at the IPsecme session
>  
> Do you mean UDP?
> 
> 
> 
> On Oct 28, 2024, at 1:20 PM, Linda Dunbar <linda.dun...@futurewei.com 
> <mailto:linda.dun...@futurewei.com>> wrote:
> 
>  
> IPsecme Chairs, 
>  
> We would like a 10minutes slot at the IPsecme session in IETF 121 to discuss 
> this draft:
> https://datatracker.ietf.org/doc/draft-dunbar-secdispatch-ligthtweight-authenticate/
>  
> This document describes lightweight authentication methods to prevent 
> malicious actors tampering with the IP encapsulation headers or metadata 
> carried by the UPD Option Header.
>  
> We revised the draft to address comments and suggestion during the offline 
> discussion at IETF120. Would like to get more feedback from the IPsecme group 
> of the revision.
>  
> Thank you. 
>  
> Linda
>  
> _______________________________________________
> IPsec mailing list -- ipsec@ietf.org <mailto:ipsec@ietf.org>
> To unsubscribe send an email to ipsec-le...@ietf.org 
> <mailto:ipsec-le...@ietf.org>
_______________________________________________
IPsec mailing list -- ipsec@ietf.org
To unsubscribe send an email to ipsec-le...@ietf.org

Reply via email to