Hi,

My first choice was (in respect with RFC 2119):
- a MUST for IPsec
Because IPsec is the security architecture for the IP layer.
- a SHOULD for IKEv2
Because,
   o Anti-replay service available for AH and ESP requires automated
SA management (cf. RFC 4301)
   o Regarding scalability/deployment, IKEv2 is useful
   o Some IPv6 nodes may have constraints (e.g. 6lowpan nodes), even
if I believe that constraints, with time and improvement of
technologies, disappear in the end.

but seeing that some people deliberately interpret "SHOULD" as a "MAY"
(i.e. the good technical reason to avoid the implementation of the
protocol is in fact only a political/company/personal - make your
choice - reason), I've decided to change my mind:
- a MUST for IPsec
- a MUST for IKEv2

Best regards.

JMC.

2010/7/20 Thomas Narten <nar...@us.ibm.com>:
> Folks,
>
> A revised version of draft-ietf-6man-node-req-bis-05.txt has been
> published, but it's Security section needs work. In particular, the WG
> needs to answer the following questions:
>
>  - Should IPsec be a SHOULD or MUST?
>  - What about IKEv2?
>
> Let me start with some background:
>
> RFC 4294 says the following:
>
>> 8.  Security
>>
>>    This section describes the specification of IPsec for the IPv6 node.
>>
>> 8.1.  Basic Architecture
>>
>>    Security Architecture for the Internet Protocol [RFC-4301] MUST be
>>    supported.
>>
>> 8.2.  Security Protocols
>>
>>    ESP [RFC-4303] MUST be supported.  AH [RFC-4302] MUST be supported.
>
> ...
>
>> 8.4.  Key Management Methods
>
>>    An implementation MUST support the manual configuration of the
>>    security key and SPI.  The SPI configuration is needed in order to
>>    delineate between multiple keys.
>>
>>    Key management SHOULD be supported.  Examples of key management
>>    systems include IKEv2 [RFC-4306] and Kerberos; S/MIME and TLS include
>>    key management functions.
>>
>>    Where key refresh, anti-replay features of AH and ESP, or on-demand
>>    creation of Security Associations (SAs) is required, automated keying
>>    MUST be supported.
>>
>>    Key management methods for multicast traffic are also being worked on
>>    by the MSEC WG.
>
> There are a couple of problems with the above text.
>
> First, AH [RFC4302] is listed as a MUST. This is old/obsolete. The
> newer versions of the IPsec architecture have changed this to a
> MAY. ESP now includes integrity protection, so one can achieve
> authentication via ESP and NULL encryption. Thus, the node
> requirements document will change AH to a MAY. (This should not be a
> controversial change.)
>
> The real issue though is as follows:
>
> The key managment recommendation is only a SHOULD, yet doesn't
> actually recommend one particular protocol. That said, the only
> available key management protocol is effectively IKE. Thus, the Node
> Requirements recommendation is a SHOULD for IKE (and IKEv2 in
> particular).
>
> But, RFC 4301 (the Security Architecture) is listed as a MUST. If one
> looks at 4301 closely, it effectively mandates IKEv2 (see
> http://www.ietf.org/mail-archive/web/ipsec/current/msg06259.html). That
> is, the IPv6 Node Requirements RFC says SHOULD for IKEv2, yet
> indirectly also says MUST for IKEv2. Talk about wanting it both
> ways...
>
> Some more thoughts.
>
> 1) Mandating IPsec (just ESP) without also supporting a key management
>   protocol has rather limited applicability. For many years, the IPv6
>   WG has insisted on IPsec being a MUST (for strong security), but in
>   the absence of key management, that requirement (IMO) rings hollow.
>
> 2) The IPv6 WG has in the past been hesitant to mandate IKE for all
>   hosts. This was viewed as a difficult requirement for some
>   devices. Although there are more implementations of IKE today, I
>   suspect there would still be hesitation to mandate IKE on all
>   nodes.
>
> 3) We've gained a lot of experience with security and security
>   protocols over the last decade.  If there is one overarching
>   lesson, it's that security isn't easy, and it's not just about
>   protocols. It's also about key distribution, certificates,
>   operational practices, etc.
>
>   Moreover, it is now recognized that with security, there is no
>   one-size-fits-all panacea. We have a plethora of security
>   technologies (ssh, ssl, tls, IPsec, etc.) and some really are more
>   appropriate for some applications than others.  So IPsec is not
>   going to turn out to be the single "holy grail" security
>   technology. It has its place, and I expect we'll see a lot more
>   usage of it over the next decade, but it is not likely to displace
>   all other approaches. And for some classes of devices and
>   applications, other security protocols will be more appropriate
>   than IPsec.
>
> 4) The breadth and range of devices that support IP is simply
>   staggering. Many are small, and some are so small, they really do
>   have legitmate issues with supporting IKEv2. Does it make sense for
>   the IETF to mandate that an iPod run IPsec and/or IKE? Sensor
>   devices?  Personally, I don't think so.
>
>   Even the current recommendation that IPsec/ESP be a MUST seems a
>   bit like ivory-tower syndrome. IPsec does make sense in a lot of
>   environments, but simply isn't required in all devices. And having
>   the IETF say it is required hasn't forced all vendors to implement
>   IPsec in their devices.
>
> Thus, it is my recommendation that the next version of the node
> requirements document make support for IPsec and IKE both SHOULDs
> only, with a lot more explanatory text that makes it clear that there
> are some types of devices where IPsec is not necessarily the best
> choice.
>
> Thoughts?
>
> Proposed new text:
>
> 10.  Security
>
>   This section describes the specification of IPsec for IPv6 nodes.
>
>   Achieving security in practice is a complex undertaking.
>   Operational procedures, protocols, key distribution mechanisms,
>   certificate management approaches, etc. are all components that
>   impact whether security is actually achieved in practice. More
>   importantly, deficiencies or a poor fit in any one individual
>   component can significantly reduce the overall effectiveness of an
>   particular security approach.
>
>   IPsec provides channel security at the Internet layer, making it
>   possible to provide secure communication for communication flows
>   between pairs of internet hosts. IPsec provides sufficient
>   flexibility and granularity that individual TCP connections can
>   (selectively) be protected, etc.
>
>   IKEv2 is the key management protocol for IPsec. Although manual
>   keying can be used with IPsec in some cases, the overall
>   applicability of statically configured keys is limited. Thus, IPsec
>   without IKEv2 has only limited value.
>
>   A range of security technologies and approaches proliferate today
>   (e.g., IPsec, TLS, SSL, SSH, HTTPS, etc.) No one approach has
>   emerged as an ideal technology for all needs. It seems clear that
>   for the foresable future, that situation will not change. Moreover,
>   IPsec is not viewed as the ideal security technology for all
>   approaches and is unlikely to displace the others. That is, IPsec
>   is not viewed as a good choice for all security needs.
>
>   Previously, IPv6 mandated implementation of IPsec and recommended
>   the key management approach of IKE. This document updates that
>   recommendation by making support of both IPsec and IKEv2 a SHOULD
>   for IPv6 nodes. In particular, it is recognized that there are a
>   range of device types and environments where other approaches to
>   security than IPsec can be more appropriate. This is particularly
>   the case for smaller specialized, single-purpose devices that
>   support only very limited applications or run on constrained
>   hardware. In other environments, support for IPsec and IKEv2 should
>   be considered a very strong SHOULD, if not a MUST.
>
>
> 10.1.  Requirements
>
>   Security Architecture for the Internet Protocol [RFC4301] SHOULD be
>   supported by all nodes. Those nodes implementing the Security
>   Archecture MUST support ESP [RFC4303] and MAY support AH
>   [RFC4302]. In addition, such nodes SHOULD implement IKEv2 [RFC4306].
>
> 10.2.  Transforms and Algorithms
>
>   The current set of mandatory-to-implement algorithms for ESP and AH
>   are defined in 'Cryptographic Algorithm Implementation Requirements
>   For ESP and AH' [RFC4835].  IPv6 nodes implementing IPsec MUST
>   conform to the requirements in [RFC4835].
>
> 10.3.  Key Management Methods
>
>   An implementation MUST support the manual configuration of the
>   security key and SPI.  The SPI configuration is needed in order to
>   delineate between multiple keys.
>
>   Where key refresh, anti-replay features of AH and ESP, or on-demand
>   creation of Security Associations (SAs) is required, IKEv2 keying
>   MUST be supported.
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to