Joy, 
Yes, your understanding is correct - WESP with the encryption flag allows 
intermediaries to determine if the payload is encrypted or NULL-encrypted and 
act accordingly. 

Thanks, 
- Ken
 

>-----Original Message-----
>From: Joy Latten [mailto:lat...@austin.ibm.com]
>Sent: Wednesday, January 06, 2010 4:16 PM
>To: Grewal, Ken
>Cc: ipsec@ietf.org
>Subject: Re: [IPsec] Traffic visibility - consensus call
>
>On Wed, 2010-01-06 at 15:42 -0700, Grewal, Ken wrote:
>> Paul,
>>
>> <Firstly, Thanks for the blank slate to respond...way too many
>messages on this topic! :-)>
>>
>> My 2 cents...
>>
>> Some people have jumped to conclusions that because we want to
>differentiate between encrypted and non-encrypted traffic by explicitly
>signaling in the packet, that WESP is now a replacement for ESP.
>>
>> THIS IS NOT THE CASE AND IT WAS NEVER THE INTENT!
>>
>> One item that may have led to this conclusion was the expanded ICV
>over WESP, but this was introduced as a mitigation for certain threats
>highlighted in the WG. Subsequent discussions have determined that it
>would be better to mitigate these treats in an alternative manner, so we
>can fall back to WESP being a wrapper for ESP, without the expanded ICV.
>Wrapped ESP provides a wrapper for ESP!
>>
>> The other item for discussion is whether WESP needs to explicitly
>differentiate between the payload being encrypted or NULL - I think this
>is a valid point to discuss.
>>
>> Numerous threads have talked about policy based deployments, mixed
>mode environments, migration paths, using/not using heuristics, etc...
>>
>> The bottom line is that in order for a network appliance (Trusted
>Intermediary) to offer critical network services (IDS/IPS/DPI/Access
>Control) in IPsec environments, it needs to know if a given IPsec packet
>is encrypted or not in a deterministic manner and this is within scope.
>> WESP is offering this determination on a per packet basis.
>>
>> I think we all agree that the traffic patterns will not fall into one
>single category (NULL OR Encrypted) within an Enterprise environment.
>i.e. There will be some traffic that is encrypted and some using NULL
>encryption.
>>
>> Some argue that we should use WESP for NULL traffic, mandating ESP for
>encrypted traffic...AND ensure that ESP is NEVER used for NULL
>encryption within a given domain / environment. How does an intermediate
>device know that this policy is being enforced? What if ESP is still
>being used for ESP-NULL and encrypted traffic? If this is the case, we
>are back to where we were/are today - no way to tell if ESP payload is
>encrypted or not.
>>
>> Having the encrypted flag within WESP allows clear and explicit
>distinction that certain traffic is encrypted whereas other traffic is
>not. This preserves the network based services we rely on and also
>allows other access control policies to be enforced. E.g. I want to
>ensure that my finance data flowing in the network is encrypted and NOT
>using ESP-NULL. If I rely on ESP for encrypted data and it can still use
>NULL encryption, I cannot enforce such a policy from an access control
>tool.
>>
>Ok. Thanks, for the clarity. I had read the latest draft and had been
>following the thread but wasn't clear on the justification of needing
>the encryption flag in WESP.
>
>So for my own understanding... the use of the "USE_WESP_MODE" for IKEv2
>as indicated in the draft guarantees that WESP-capable nodes only use
>ESP for encryption and WESP for ESP-NULL. My thinking is, the SA created
>will somehow indicate this "USE-WESP-MODE" and thus guarantee that the
>packets on the SA enforce this policy, right? However, this is on the
>end node, not the intermediate device. And it is the intermediate device
>we want to give the guarantee to... especially in a mixed-environment...
>And the WESP header, with an encryption flag indicating encrypted or
>not, supplies this guarantee to the device. Am I understanding this
>correctly or missing something or not even in the ballpark?
>
>If I have understood correctly, then in reference to Yaron's email, I
>vote:
>
>>>- The current draft
>>>(http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-11)
>>>defines the ESP trailer's ICV calculation to include the WESP header.
>>>This has been done to counter certain attacks, but it means that WESP
>>>is no longer a simple wrapper around ESP - ESP itself is modified. Do
>>>you support this design decision?
>
>No. Go back to WESP as a wrapper for ESP.
>
>>>- The current draft allows WESP to be applied to encrypted ESP flows,
>>>in addition to the originally specified ESP-null. This was intended so
>>>that encrypted flows can benefit from the future extensibility offered
>>>by WESP. But arguably, it positions WESP as an alternative to ESP. Do
>>>you support this design decision?
>
>Yes.
>
>regards,
>Joy
>
>
>> Bottom line is that having this 'encryption' flag in WESP provides the
>capability to deterministically provide and preserve critical network
>services in IPsec environments, as well as apply access control
>policies. Without it, we are back to half-baked solutions.
>>
>> As others have quoted the charter, here it is again...
>>
>> "A standards-track mechanism that allows an intermediary device, such
>> as a firewall or intrusion detection system, to easily and reliably
>> determine whether an ESP packet is encrypted with the NULL cipher; and
>> if it is, determine the location of the actual payload data inside the
>> packet."
>>
>> If we say that WESP is ONLY used to carry ESP-NULL (and ESP is used to
>carry encrypted traffic, but based on the ESP spec and legacy, it may
>also carry ESP-NULL), then we have not completed what we set out to do,
>as we have failed to *reliably* determine if the ESP traffic is
>encrypted or not!
>>
>> Again, WESP does not replace ESP. It offers what it set out to do - an
>easy and reliable way to tell if an IPsec packet has a NULL payload or
>if it is encrypted.
>>
>> Thanks,
>> - Ken
>>
>>
>> >-----Original Message-----
>> >From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On
>Behalf
>> >Of Paul Koning
>> >Sent: Wednesday, January 06, 2010 1:43 PM
>> >To: Stephen Kent
>> >Cc: ipsec@ietf.org
>> >Subject: Re: [IPsec] Traffic visibility - consensus call
>> >
>> >I've been watching a long stream of messages about WESP flying by and
>I
>> >must admit to being rather confused.  What follows is based on my
>best
>> >understanding of what's going on, so please apply grains of salt as
>> >needed.
>> >
>> >It's likely that I'm in the same corner as Tero.
>> >
>> >It sounds to me like WESP was chartered to do something very
>specific,
>> >having to do with ESP-NULL and intermediate systems looking at
>traffic.
>> >And now we have discussions about ESP-nonNULL with WESP, and maybe
>WESP
>> >as an alternative to ESP, or a replacement to ESP.
>> >
>> >How is this possible?  It's nice to talk about the benefits of
>greater
>> >generality and all that, but it isn't proper to have a WG chartered
>to
>> >do a narrow thing and then end up doing something much bigger.
>> >
>> >Why not?
>> >
>> >Answer: the purpose of a charter is (a) to tell the WG what it should
>be
>> >doing, (b) to tell observers whether the work of the WG is something
>> >they need to track -- or do NOT need to track.
>> >
>> >If a WG goes well outside its charter, that's not fair to those who
>> >would have participated if the charter had said this, but ended up
>not
>> >participating because the charter told them they did not need to.
>From
>> >what I understand from Tero's comments, that situation applies to
>him,
>> >and I think it applies to me as well.
>> >
>> >It may well be a good idea to expand or modify or generalize or
>replace
>> >ESP, but if such a project is to be done, it should be done by a WG
>> >chartered for that purpose, so that all interested parties are on
>notice
>> >that this work is about to happen.
>> >
>> >Meanwhile, as to the consensus call: if this is out of charter as it
>> >appears to be, then, independent of its technical merit, my vote is
>NO.
>> >
>> >    paul koning
>> >_______________________________________________
>> >IPsec mailing list
>> >IPsec@ietf.org
>> >https://www.ietf.org/mailman/listinfo/ipsec
>> _______________________________________________
>> IPsec mailing list
>> IPsec@ietf.org
>> https://www.ietf.org/mailman/listinfo/ipsec

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to