Hi,

2008/2/26, Basavaraj Patil <[EMAIL PROTECTED]>:
>
>  It is not the load or processing that is the issue really which I think you
>  are alluding to. It is just the complexity of integrating a protocol like
>  Mobile IPv6 with IPsec and IKE/IKEv2.
>  Mobile IPv6 signaling can be secured via simpler mechanisms.

More you have different mechanisms to secure service, more you will
have complexity and more you will have a security hole somewhere ...

> But because of
>  the prevailing thinking that IPsec MUST be used as the security mechanism,
>  we stuck with it and are lets say not too happy about it.

Sorry, but who are "we"?

Best regards.

JMC.

>
>
>  -Basavaraj
>
>
>
>  On 2/26/08 12:13 PM, "ext Vishwas Manral" <[EMAIL PROTECTED]> wrote:
>
>  > Hi Basavraj,
>  >
>  > But isn't that something IPsec needs to improve on. We already have
>  > efforts like BTNS with "connection latching" in IPsec which may help
>  > to ease the load on the end devices, which seems to have been the main
>  > issue raised.
>  >
>  > Thanks,
>  > Vishwas
>  >
>  > On Tue, Feb 26, 2008 at 9:58 AM, Basavaraj Patil
>  > <[EMAIL PROTECTED]> wrote:
>  >>
>  >>  I agree with Thomas about his views on IPsec being a mandatory and 
> default
>  >>  component of the IPv6 stack.
>  >>  Because of this belief, Mobile IPv6 (RFC3775) design relied on IPsec for
>  >>  securing the signaling. This has lead to complexity of the protocol and 
> not
>  >>  really helped either in adoption or implementation.
>  >>  IPsec based security is an overkill for Mobile IPv6 and illustrates the
>  >>  point that you do not have to use it simply because it happens to be an
>  >>  integral part of IPv6.
>  >>
>  >>  -Basavaraj
>  >>
>  >>
>  >>
>  >>
>  >>  On 2/26/08 10:18 AM, "ext Thomas Narten" <[EMAIL PROTECTED]> wrote:
>  >>
>  >>> IMO, we need to get over the idea that IPsec is mandatory in
>  >>> IPv6. Really. Or that mandating IPsec is actually useful in practice.
>  >>>
>  >>> It is the case that mandating IPsec as part of IPv6 has contributed to
>  >>> the hype about how great IPv6 is and how one will get better security
>  >>> with IPv6. Unfortunately, that myth has also harmed the overall IPv6
>  >>> deployment effort, as people look more closely and come to understand
>  >>> that deploying IPv6 doesn't automatically/easily yield improved
>  >>> security.
>  >>>
>  >>> We all know the reality of security is very different and much more
>  >>> complicated/nuanced then just saying "use IPsec".
>  >>>
>  >>> Consider:
>  >>>
>  >>> IPsec by itself (with no key management) is close to useless. The
>  >>> average person cannot configure static keys, so the result is (in
>  >>> effect) a useless mandate (as a broad mandate for ALL nodes).
>  >>>
>  >>> What applications actually make use of IPsec for security? A lot fewer
>  >>> than one might think. For many IPv6 devices/nodes, if one actually
>  >>> looks at the applications that will be used on them, they do not use
>  >>> IPsec today for security. And, there are strong/compelling arguments
>  >>> for why IPsec is not the best security solution for many applications.
>  >>> Thus, requiring IPsec is pointless.
>  >>>
>  >>> To be truly useful, we (of course) need key management. If we want to
>  >>> mandate key management, the stakes go way up. IKEv1/v2 is not a small
>  >>> implementation effort. And, we are now in the funny situation where
>  >>> IKEv1 has been implemented, but due to shortcomings, IKEv2 has already
>  >>> been developed. IKEv2 has been out for over 2 years, but
>  >>> implementations are not widespread yet. So, would we mandate IKEv1
>  >>> (which is obsoleted and has documented issues), or do we mandate
>  >>> IKEv2, even though it is clear it is not widely available yet?
>  >>>
>  >>> IMO, we should drop the MUST language surrounding IPsec. The technical
>  >>> justification for making it MUST are simply not compelling. It seems
>  >>> to me that the MUST is there primarily for historical/marketing
>  >>> reasons.
>  >>>
>  >>> Note that dropping the MUST will not mean people stop implementing
>  >>> IPsec, where there is compelling benefit. Indeed, note that the USG
>  >>> has already moved away from IKEv1 and has strongly signalled that it
>  >>> will require IKEv2 going forward. So I am confident that IPsec (and
>  >>> IKE) will get implemented going forward.
>  >>>
>  >>> But there is no reason why IPsec should be mandated in devices where
>  >>> it is clear (based on the function/purpose of the device) that IPsec
>  >>> will in fact not actually be used.
>  >>>
>  >>> As a general "node requirement", SHOULD is the right level, not MUST.
>  >>>
>  >>> Thomas
>  >>> --------------------------------------------------------------------
>  >>> IETF IPv6 working group mailing list
>  >>> ipv6@ietf.org
>  >>> Administrative Requests: http://www.ietf.org/mailman/listinfo/ipv6
>  >>> --------------------------------------------------------------------
>  >>
>  >>  --------------------------------------------------------------------
>  >>  IETF IPv6 working group mailing list
>  >>  ipv6@ietf.org
>  >>  Administrative Requests: http://www.ietf.org/mailman/listinfo/ipv6
>  >>  --------------------------------------------------------------------
>  >>
>
>  --------------------------------------------------------------------
>  IETF IPv6 working group mailing list
>  ipv6@ietf.org
>  Administrative Requests: http://www.ietf.org/mailman/listinfo/ipv6
>  --------------------------------------------------------------------
>
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to