Re: [IPsec] Update and WGLC request [Re: I-D Action: draft-ietf-ipsecme-iptfs-02.txt]

2020-10-14 Thread Michael Richardson
Christian Hopps wrote: > I really don't understand the extreme back pressure against using ESP > the way it was designed. The next-header field is supposed to identify > the payload, it does so for every other payload ESP carries. Any other > solution to somehow infer the payload

Re: [IPsec] Update and WGLC request [Re: I-D Action: draft-ietf-ipsecme-iptfs-02.txt]

2020-10-14 Thread Lou Berger
Thanks Valery.  Based on the subsequent discussions, I suspect it may be best to just drop the whole section/capability.  So much for postel's law... Lou On 10/14/2020 2:26 AM, Valery Smyslov wrote: Hi Lou, Valery, >    If IKE is used to negotiate using IP-TFS, then such switching MUST NOT

Re: [IPsec] Update and WGLC request [Re: I-D Action: draft-ietf-ipsecme-iptfs-02.txt]

2020-10-14 Thread Christian Hopps
> On Oct 14, 2020, at 6:19 AM, Tero Kivinen wrote: > > Christian Hopps writes: >> What is intended is that an implementation can process inbound IPTFS >> payloads w/o actually explicitly configuring the inbound SA to be in >> "IPTFS-mode" (zero-conf). That is all. > > And if IKE is used what i

Re: [IPsec] Update and WGLC request [Re: I-D Action: draft-ietf-ipsecme-iptfs-02.txt]

2020-10-14 Thread Christian Hopps
I really don't understand the extreme back pressure against using ESP the way it was designed. The next-header field is supposed to identify the payload, it does so for every other payload ESP carries. Any other solution to somehow infer the payload type some other way *has* to be seen as a hack

Re: [IPsec] Update and WGLC request [Re: I-D Action: draft-ietf-ipsecme-iptfs-02.txt]

2020-10-14 Thread Tero Kivinen
Christian Hopps writes: > What is intended is that an implementation can process inbound IPTFS > payloads w/o actually explicitly configuring the inbound SA to be in > "IPTFS-mode" (zero-conf). That is all. And if IKE is used what is the use case for that? IKE allows easy way of agreeing on the

Re: [IPsec] Update and WGLC request [Re: I-D Action: draft-ietf-ipsecme-iptfs-02.txt]

2020-10-14 Thread Tero Kivinen
Valery Smyslov writes: > Hi Tero, > > > > I'm not advocating ike vs ike-less, just trying to have a comprehensive > > > solution.  One example ikeless usecase is captured by the YANG model in > > > last call: > > > https://tools.ietf.org/html/draft-ietf-i2nsf-sdn-ipsec-flow-protection-09 > > > >

Re: [IPsec] Update and WGLC request [Re: I-D Action: draft-ietf-ipsecme-iptfs-02.txt]

2020-10-14 Thread Christian Hopps
What is intended is that an implementation can process inbound IPTFS payloads w/o actually explicitly configuring the inbound SA to be in "IPTFS-mode" (zero-conf). That is all. Thanks, Chris. > On Oct 14, 2020, at 4:01 AM, Valery Smyslov wrote: > > HI Chris, > >> Indeed, this isn't about swi

Re: [IPsec] Update and WGLC request [Re: I-D Action: draft-ietf-ipsecme-iptfs-02.txt]

2020-10-14 Thread Valery Smyslov
HI Chris, > Indeed, this isn't about switching a pair of SAs to IPTFS in the middle of > the tunnel operation. This is only > about supporting the receipt of IPTFS as a payload in ESP. I admit, that English is not my native language :-), but the text in the draft in my reading suggests exactly

Re: [IPsec] Update and WGLC request [Re: I-D Action: draft-ietf-ipsecme-iptfs-02.txt]

2020-10-14 Thread Christian Hopps
Indeed, this isn't about switching a pair of SAs to IPTFS in the middle of the tunnel operation. This is only about supporting the receipt of IPTFS as a payload in ESP. Zero conf (or globally config enabled) receive support of IPTFS payloads is seen by some as a real value add. I'm not sure wha