Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-13 Thread Tero Kivinen
Bhatia, Manav (Manav) writes: > > You gave reasons why ESP-NULL is needed, not why ESP-NULL visibility > > is needed. > > One might want to filter OSPFv3 packets coming from outside the domain. It is much better to do that check on the OSPFv3 receiver end where the packet is actually authenticat

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-13 Thread Bhatia, Manav (Manav)
> > > Yes, but I do not really think people are going to solve > those using > > > ESP-NULL. I think they must move to encrypted ESP to provide > > > confidentiality also, and that makes the need for > ESP-NULL visibility > > > even less. > > > > I disagree. With AH as a MAY and ESP as MUST in I

Re: [IPsec] Question on RFC 4718 section 5.11.8. Collisions with IKE_SA Rekeying

2009-02-13 Thread Tero Kivinen
Keith Welter writes: > Actually the IKE SA is open. Host A sent NO_PROPOSAL_CHOSEN because it > received a request to rekey the IKE SA when it had a child SA in > half-closed state. Here is the specific scenario I'm interested in: > 1) Host A initiates rekey of a child SA. > 2) Host B processing

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-13 Thread Tero Kivinen
Bhatia, Manav (Manav) writes: > > > > > BTW, insider threats are on the rise according to various public > > > reports, so should not be discounted. This is one of the motivations > > > of employing security, even within the Enterprise. > > > > Yes, but I do not really think people are going to s

[IPsec] Is an empty CertRequest payload valid in IKEv2?

2009-02-13 Thread Tero Kivinen
David Wierbowski writes: > If there is no concept of an empty certificate request in IKEv2 why is the > text in section 3.6 a SHOULD and not a MUST? It seems to me that in order > to ensure interoperability the text in Section 3.6 should read, > "Certificate payloads MUST be included in an exchang