On Jan 1, 2012, at 7:12 PM, John Smith wrote:

> Hi,
> 
> I am trying to see if there are people who use AH specially since RFC 4301 
> has a MAY for AH and a MUST for ESP-NULL. While operators may not care about 
> a MAY or a MUST in an RFC, but the IETF protocols and vendors do. So all 
> protocols that require IPsec for authentication implicitly have a MAY for AH 
> and a MUST for ESP-NULL.
> 
> Given that there is hardly a difference between the two, I am trying to 
> understand the scenarios where people might want to use AH? OR is it that 
> people dont care and just use what their vendors provide them?
> 
> Regards,
> John

AH provides for  connectionless integrity and data origin authentication and 
provides protection against replay attacks.  Many US Gov departments that have 
to follow NIST and do not understand what this means require it between 
internal point-to-point routers between one portion of their organization and 
another adding more expense for no increase in operational security.

If you are following NIST or DCID-63, this is required to meet certain 
integrity requirements

ESP provides confidentiality,  data origin authentication,  connectionless 
integrity,  an anti-replay service,  and limited traffic flow confidentiality.  
EG AH portion provides for the integrity requirement and the ESP encryption 
provides for the confidentiality requirement of NIST.

Think of AH that it is like just signing a PGPMail and ESP as signing and 
encrypting a PGPMail.

There are reasons for both.

Tom


Reply via email to