The __exact__ same discussion happening on IPsecME WG right now.

http://www.ietf.org/mail-archive/web/ipsec/current/msg07346.html

It seems there is yet another effort being made to "retire" AH so that
we have less # of options to deal with. This time there is some
support for it ..

Jack

On Mon, Jan 2, 2012 at 7:20 AM, Steven Bellovin <s...@cs.columbia.edu> wrote:
>
> On Jan 1, 2012, at 8:34 PM, TR Shaw wrote:
>
>> John,
>>
>> Unlike AH,  ESP in transport mode does not provide integrity and 
>> authentication for the entire IP packet. However,  in Tunnel Mode,  where 
>> the entire original IP packet is encapsulated with a new packet header 
>> added,  ESP protection is afforded to the whole inner IP packet (including 
>> the inner header) while the outer header (including any outer IPv4 options 
>> or IPv6 extension headers) remains unprotected.  Thus, you need AH to 
>> authenticate the integrity of the outer header packet information.
>
>
> Not quite.  While the cryptographic integrity check does not cover the source 
> and destination addresses -- the really interesting part of the outer header 
> -- they're bound to the security association, and hence checked separately.  
> Below is a note I sent to the IPsec mailing list in 1999.
>
> That, however, is not the question that is being asked here.  The IPsecme 
> working group has been over those issues repeatedly; your (non)-issue and 
> (slightly) more substantive issues about IPv6 have been rehashed ad nauseum.  
> The questions on the table now are, first, are operators using AH, and if so 
> is ESP with NULL encryption an option?
>
>                --Steve Bellovin, https://www.cs.columbia.edu/~smb
>
>
>        One of the biggest reasons we have AH is because there _are_
>        some things in the middle of the "IP header" that need to be
>        authenticated for them to be simultaneously safe and useful.
>        The biggest example of this is source routing.
>
> In my opinion -- and I've posted this before -- there's nothing in the
> IP header that's both interesting and protected.  You can't protect the
> source routing option, since the next-hop pointer changes en route.
> Appendix A of the AH draft recognizes that, and lists it as 'mutable --
> zeroed'.
>
> When you look over the list of IP header fields and options that are
> either immutable or predictable, you find that the only things that are
> really of interest are the source and destination addresses and the
> security label.  To the extent that we want to protect the addresses --
> a point that's very unclear to me -- they're bound to the security
> association.  The security label certainly should be.  If you're using
> security labels (almost no one does) and you don't have the facilities
> to bind it at key management time, use tunnel mode and be done with it.
>
>        I'll admit that I've never been in the operations business, but
>        I've been told that source routing is a very useful tool for
>        diagnosing some classes of problems.  AH allows source routing
>        to be useful again w/o opening the holes it opens.
>
> Well, yes, but not for the reason you specify.  The problem with source
> routing is that it makes address-spoofing trivial.  With AH, people
> will either verify certificate names -- the right way to do things --
> or they'll bind a certificate to the source address, and use AH to
> verify the legitimacy of it.  The route specified has nothing to do
> with it, and ESP with null encryption does the same thing.
>
> I don't like AH, either in concept or design (and in particular I don't
> like the way it commits layer violations).  Its only real use, as I see
> it, is to answer Greg Minshall's objections -- it leaves the port
> numbers in the clear, and visible in a context-independent fashion.
> With null encryption, the monitoring station has to know that that was
> selected.  But I'm very far from convinced that these issues are
> important enough to justify AH.
>
> All that notwithstanding, this is not a new issue.  We've been over
> this ground before in the working group.  Several of us, myself
> included, suggested deleting AH.  We lost.  Fine; so be it.  Let's ship
> the documents and be done with it.

Reply via email to