Hi Erik,

please see inline.

> Erik Kline has entered the following ballot position for
> draft-ietf-ipsecme-g-ikev2-20: No Objection
> 
> When responding, please keep the subject line intact and reply to all email
> addresses included in the To and CC lines. (Feel free to cut this introductory
> paragraph, however.)
> 
> 
> Please refer to 
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-
> positions/
> for more information about how to handle DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-ipsecme-g-ikev2/
> 
> 
> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> # Internet AD comments for draft-ietf-ipsecme-g-ikev2-20
> CC @ekline
> 
> * comment syntax:
>   - https://github.com/mnot/ietf-comments/blob/main/format.md
> 
> * "Handling Ballot Positions":
>   - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/
> 
> ## Comments
> 
> ### S4.4.2
> 
> * "UDP encapsulation of ESP packets [RFC3948] cannot be specified in
>    G-IKEv2 and thus it is not used for the multicast Data-Security SAs."
> 
>   I didn't immediately follow why this should necessarily be true. If
>   there's an explanation, or a link to section I didn't properly grok,
>   some brief addition might be nice.

UDP encapsulation is used in IPsec to allow NAT traversal
(NATs usually have trouble with mapping outbound ESP traffic to inbound one
if pure ESP is used). In IKEv2 UDP encapsulation is not negotiated explicitly:
if both peers support it, then they evaluate whether NAT is present in between 
during IKE SA establishment and if this is the case, they just encapsulate ESP 
in UDP.

With G-IKEv2 the presence of NATs between the GM and the GCKS doesn't matter.
The possible presence of NATs between group senders and group receivers
would have mattered, but the GCKS is in general unaware of this. 
In addition, we believe that NATs would not be as unfriendly to multicast ESP 
SAs
as they are to unicast communications, because multicast traffic is 
unidirectional and NATs do not need to do any mapping of inbound/outbound SAs - 
they can just change source IP as they like, thus no UDP encapsulation is 
needed.
And the last point - we also think that using NATs for multicast ESP is moot in 
general - 
RFC 4301 specifies that source IP address may also be used (e.g. in case of 
SSM) when mapping
an incoming ESP packet to an SA (along with the SPI and the destination IP),
so at lease NATs should not change source IP on their discretion.

Sorry for long and messy explanation. We thought it was too long to include
into the document, and we failed to compact it :-) Do you think that some text 
should be added anyway?

> ## Nits
> 
> ### S1
> 
> * "where multicast communications indicated with double line" ->
>   "where multicast communications are indicated with a double line"

Fixed, thank you.

Regards,
Valery.


_______________________________________________
IPsec mailing list -- ipsec@ietf.org
To unsubscribe send an email to ipsec-le...@ietf.org

Reply via email to