+1 

> -----Original Message-----
> From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] 
> On Behalf Of Brian Swander
> Sent: Tuesday, December 22, 2009 4.43 AM
> To: Yaron Sheffer; Tero Kivinen; Jack Kohn
> Cc: ipsec@ietf.org; Russ Housley
> Subject: Re: [IPsec] DISCUSS: draft-ietf-ipsecme-traffic-visibility
> 
> I took Russ' comments about "being in the rough" to imply 
> that we're re-opening the consensus discussion.  I'm not sure 
> why we're reopening this, since we already got consensus on 
> this when it came up the first time.  Since many of our 
> internal guys are already out for the holidays, I can't see 
> meaningful consensus occurring until the new year.
> 
> bs
> 
> 
> -----Original Message-----
> From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] 
> On Behalf Of Yaron Sheffer
> Sent: Monday, December 21, 2009 5:25 AM
> To: Tero Kivinen; Jack Kohn
> Cc: ipsec@ietf.org; Russ Housley
> Subject: Re: [IPsec] DISCUSS: draft-ietf-ipsecme-traffic-visibility
> 
> Hi Tero,
> 
> Allowing the more generic, encrypted WESP (as per the current 
> I-D) would let vendors experiment with different extensions. 
> Yes, they might play with some extensions that you and I find 
> ugly or even insecure. But crippling WESP today would mean 
> that any such extensions are (1) limited to IKE and (2) 
> invisible to the middleboxes.
> 
> Thanks,
>       Yaron
> 
> -----Original Message-----
> From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] 
> On Behalf Of Tero Kivinen
> Sent: Monday, December 21, 2009 13:36
> To: Jack Kohn
> Cc: ipsec@ietf.org; Russ Housley
> Subject: Re: [IPsec] DISCUSS: draft-ietf-ipsecme-traffic-visibility
> 
> Jack Kohn writes:
> > Alternatively, since we seem to be
> > having unlimited bandwidth for discussions, we might as well argue
> > whether we need heuristics also or not, as there are very few people
> > in IPSecMe WG who feel the need for it.
> 
> My personal feelings is that this inspecting ESP-NULL packets is not
> needed at all, as everything will be encrypted ESP anyways, so there
> is even no point of trying to inspect any of that ESP-NULL traffic
> (either using WESP or heuristics).
> 
> The reason I am in favor of heuristics instead of WESP, is that
> heuristics requires changes only on the middleboxes, we do not need to
> make new extension that will affect all the end nodes supporting
> IPsec.
> 
> Also heuristics is not harmful, as it does not harm others, it is
> simply internal matter inside the middlebox. I do consider WESP a bit
> harmful, as it adds extra bytes to all packets, and does not offer
> that much which cannot already be done by other means, but requires
> all IPsec end nodes to be updated (and also every single firewall
> needs to be reconfigured to allow also this new protocol number
> through not just proto 50 and 51).
> 
> But those are my personal feelings, and I agreed that as rest of the
> WG seemed to want to work on WESP, that is fine, but I still wanted
> push the heuristics forward just as middlebox only alternative to
> WESP.
> 
> > Strangely, its that same set of people who are against the idea of
> > using null NULL ciphers for WESP. Is it because by supporting
> > encryption in WESP we make it more generic, and thereby increasing
> > the chances of its widespread implementation as against the other
> > proposal (heuristics)?
> 
> Using non-NULL ciphers for WESP takes it out from its intended use,
> and unless there is some more extensions done for WESP (which there
> currently isn't), there is no point of doing that, as using WESP for
> encrypted ESP we are just wasting bytes for extra WESP header.
> 
> Meaning that before we see any extensions that would require WESP and
> encrypted ESP I do not think there is any point of sending encrypted
> ESP traffic using WESP. 
> 
> And yes, making WESP more generic would mean that I would perhaps some
> day need to implement it (which I do not want to) if there is too much
> customer demand for it in the future.
> -- 
> kivi...@iki.fi
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
> 
> Scanned by Check Point Total Security Gateway.
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
> 
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
> 
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to