Ken:

[Ken] I think this is the whole point. All the work on ESP/IPsec this far has been considering a two party interaction (outside the multicast context!). Now there is a third party - the middle box, which would like to gain some additional information in order to provide valuable network services. The end boxes already know what is being negotiated, so just making changes to IKE to add additional capability is insufficient in certain scenarios (while perfectly sufficient in others). We need to provide additional information in the data path, hence the need for WESP.

I do not agree with your assessment of the situation. I agree with Tero's thoughts.

The IPsecME charter includes this work item:

  A standards-track mechanism that allows an intermediary device, such
  as a firewall or intrusion detection system, to easily and reliably
  determine whether an ESP packet is encrypted with the NULL cipher; and
  if it is, determine the location of the actual payload data inside the
  packet. The starting points for this work item are
  draft-grewal-ipsec-traffic-visibility and draft-hoffman-esp-null-protocol.

Nothing in this description prepared me for WESP processing of ESP packets with a non-NULL-cipher. It suggests making it easy for the middlebox to gain access to data that is already plaintext. It does not suggest making information available to the middlebox that was previously unavailable to it.

Further, based on the discussion that has happened since I posted my DISCUSS position, other IPsecME WG participants are uncomfortable with the direction that WESP has taken. As the discussion progresses, if I can see that these people and myself are in the rough, then I will clear. So far, that does not seem to be the case.

Russ
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to