Re: [IPsec] Avoiding Authentication Header (AH)

2012-01-11 Thread Bhatia, Manav (Manav)
Hi Tero, [clipped] > And why would routing protocols need to use WESP, I would assume > they use ESP-NULL instead. In addition if you use manual keying Sigh. We've gone through this before I think on the KARP mailing list (am not sure though). Routing protocols could "potentially" use WESP s

Re: [IPsec] Avoiding Authentication Header (AH)

2012-01-05 Thread Bhatia, Manav (Manav)
05, 2012 9:18 PM To: Bhatia, Manav (Manav) Cc: Tero Kivinen; IPsec ME WG List Subject: Re: [IPsec] Avoiding Authentication Header (AH) On Jan 5, 2012, at 4:37 PM, Bhatia, Manav (Manav) wrote: > >> Getting WESP implemented to the boxes will require a lot of time. >> There are stil

Re: [IPsec] Avoiding Authentication Header (AH)

2012-01-05 Thread Bhatia, Manav (Manav)
> Getting WESP implemented to the boxes will require a lot of time. > There are still lots of boxes which do not even support IKEv2 (which is > required for > WESP) and IKEv2 has been out for 6 years already. AH might already be WESP can be used with manual keying the way routing protocols tod

Re: [IPsec] Avoiding Authentication Header (AH)

2012-01-05 Thread Bhatia, Manav (Manav)
ee with Yaron that there is value in some document that recommends not using AH when ESP-NULL can be employed, and also that points out where AH does make sense. Cheers, Manav -Original Message- From: Sean Turner [mailto:turn...@ieca.com] Sent: Thursday, January 05, 2012 9:01 AM To:

Re: [IPsec] WESP and reliability

2012-01-04 Thread Bhatia, Manav (Manav)
Ran, > Such packets have been encountered by prototype implementations in at least > one firewall. > I will certainly encourage those folks to share a sample packet here, but > they don't > usually show up at IETF and can be very shy. > > I think WESP was a valiant try, and it seems to work

Re: [IPsec] Avoiding Authentication Header (AH)

2012-01-04 Thread Bhatia, Manav (Manav)
ESP-NULL and not even bother with AH if they can do with just ESP. Cheers, Manav -Original Message- From: m...@sandelman.ca [mailto:m...@sandelman.ca] Sent: Wednesday, January 04, 2012 7:46 PM To: Bhatia, Manav (Manav) Cc: Nico Williams; ipsec@ietf.org Subject: Re: [IPsec] Avo

Re: [IPsec] Avoiding Authentication Header (AH)

2012-01-04 Thread Bhatia, Manav (Manav)
> There is no evidence of any recent change either to the operational > circumstances or to the available alternatives. So no update is appropriate > at this time. One major recent change is the publication of WESP [RFC 5840] and the standard for using Heuristics for detecting ESP-NULL pack

[IPsec] NIST's Guidelines for secure deployment of IPv6

2012-01-04 Thread Bhatia, Manav (Manav)
NIST has published the "Guidelines for secure deployment of IPv6" and it unequivocally says that AH has fallen out for ESP-NULL. One can go through the document in detail. I have not gone through the entire document but here are some excerpts from that document: (1) It says the following for OS

Re: [IPsec] Avoiding Authentication Header (AH)

2012-01-03 Thread Bhatia, Manav (Manav)
Hi Nico, > Advising (and updating said advice as circumstances change) > use-IPsec protocol designers as to when to use ESP and/or AH > is something we should do. Deprecating AH seems like a nice > idea, but if there's good reasons to still use it, then maybe not. We're not talking about dep

Re: [IPsec] Avoiding Authentication Header (AH)

2012-01-02 Thread Bhatia, Manav (Manav)
And most of these are considered dangerous and are generally discouraged. http://tools.ietf.org/html/rfc6398 Cheers, Manav -Original Message- From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of RJ Atkinson Sent: Tuesday, January 03, 2012 6:18 AM To: IPsec ME WG Li

Re: [IPsec] Avoiding Authentication Header (AH)

2012-01-02 Thread Bhatia, Manav (Manav)
Ran, > You might also be interested in the following draft which will be published > as RFC any time now: > http://tools.ietf.org/html/draft-ietf-ospf-auth-trailer-ospfv3-11 > I am well aware of it. That document does NOT deprecate use of AH with > OSPFv3 either. It doesn't need to because n

Re: [IPsec] Avoiding Authentication Header (AH)

2012-01-02 Thread Bhatia, Manav (Manav)
Hi Nico, http://tools.ietf.org/html/draft-bhatia-ipsecme-avoiding-ah-00 is NOT trying to move AH to Historic. Its merely trying to discourage newer applications and protocols from mandating AH as the same level of security can be achieved with ESP-NULL. The draft also says: It however, doe

Re: [IPsec] Avoiding Authentication Header (AH)

2012-01-02 Thread Bhatia, Manav (Manav)
[clipped] > Most major IPv6 routers, for example multiple product lines from both Cisco > and Juniper, also support AH in shipping product and have done for some while > now. > So AH remains a very widely available protocol. It may be widely available, but clearly it isnt as widely used. Are

Re: [IPsec] Avoiding Authentication Header (AH) (was Moving Authentication Header (AH) to Historic)

2012-01-01 Thread Bhatia, Manav (Manav)
Hi Michael, > I do not agree that WESP provides the service desired. > WESP requires cooperation (and therefore upgrade) of the end points. > > What AH does that ESP NULL does not, is that it guarantees that the things > after the AH header are in fact in the clear. One can in fact, ignore the

[IPsec] Avoiding Authentication Header (AH) (was Moving Authentication Header (AH) to Historic)

2012-01-01 Thread Bhatia, Manav (Manav)
0:03 PM To: Bhatia, Manav (Manav) Cc: ; IPsecme WG Subject: Re: [IPsec] Moving Authentication Header (AH) to Historic On Jan 1, 2012, at 8:17 AM, Bhatia, Manav (Manav) wrote: > To get around this process problem do you suggest that I publish a new draft > - "Avoiding Authentication Heade

Re: [IPsec] Moving Authentication Header (AH) to Historic

2012-01-01 Thread Bhatia, Manav (Manav)
Hi Paul, To get around this process problem do you suggest that I publish a new draft - "Avoiding Authentication Header (AH)" that's mostly a copy-paste of my current draft? Cheers, Manav -Original Message- From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of Paul

Re: [IPsec] Moving Authentication Header (AH) to Historic

2011-12-31 Thread Bhatia, Manav (Manav)
Hi David and Yaron, I think its possible to edit the draft headers and the text so that we basically say that AH should NOT be used for newer proposals unless there is a burning reason to do so. And if someone wants to use AH, then they should have a pretty good reason for doing that. In my dra

[IPsec] Moving Authentication Header (AH) to Historic

2011-12-29 Thread Bhatia, Manav (Manav)
Hi, We have had several discussions in the past about the utility of AH when ESP with NULL encryption offers everything that AH has to offer. I have written a very small draft that recommends moving AH to the Historic status. This document does NOT deprecate AH and it does NOT mean that people

Re: [IPsec] [TICTOC] Review request for IPsec security for packet based synchronization (Yang Cui)

2011-10-19 Thread Bhatia, Manav (Manav)
Hi, I had spoken to one of the initial authors of this IPsec draft and I was told that setting up an Ipsec tunnel exclusively for shipping 1588 may not be possible in the femto architecture. They are thus trying to use WESP (that I have co-authored) to identify 1588 packets within an IPSec stre

Re: [IPsec] Traffic visibility - consensus call

2010-01-11 Thread Bhatia, Manav (Manav)
av > > The more I think of this problem the more worthless WESP becomes. > > Dan. > > On Mon, January 11, 2010 1:02 am, Bhatia, Manav (Manav) wrote: > > I believe Ken is alluding to removing the WESP header from the ICV > > calculation, and relying on e

Re: [IPsec] Traffic visibility - consensus call

2010-01-11 Thread Bhatia, Manav (Manav)
I believe Ken is alluding to removing the WESP header from the ICV calculation, and relying on explicitly checking the WESP header at the endnodes. Cheers, Manav > -Original Message- > From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] > On Behalf Of pasi.ero...@nokia.com > Se

Re: [IPsec] Traffic Visibility Future

2010-01-08 Thread Bhatia, Manav (Manav)
> > > > In an ideal world maybe. Sometimes the netwwork needs to > mark traffic > > at the edge switch but doesn't 'trust' the endpoint to do it. So > > typically it would be done with policy rules. > > We're talking about making changes to the end nodes anyways, > so why not > make them handle

Re: [IPsec] Traffic Visibility Future

2010-01-08 Thread Bhatia, Manav (Manav)
2 AM > To: Bhatia, Manav (Manav) > Cc: Dan Harkins; Jack Kohn; ipsec@ietf.org > Subject: Re: [IPsec] Traffic Visibility Future > > > I would be very much interested in a real-world example instead > of hypotheticals. What service provider is asking for WESP? > > Dan.

Re: [IPsec] Traffic Visibility Future

2010-01-07 Thread Bhatia, Manav (Manav)
Dan, [clipped] > Because it's unnecessary bloat that another group may not have any > use for. ESP-null could be used, for instance, to protect > packets in an > EGP routing protocol. There is no need for WESP in such an > environment. EGP routing protocols, by definition and design, will t

Re: [IPsec] DISCUSS: draft-ietf-ipsecme-traffic-visibility

2010-01-05 Thread Bhatia, Manav (Manav)
Hi Russ, > My point is that the end system does not need the information in the > WESP header to properly handle the packet for the supported > application. The additional information is being exposed to allow > middle boxes to make various checks. The end system can > ensure that the > ex

Re: [IPsec] Traffic visibility - consensus call

2010-01-05 Thread Bhatia, Manav (Manav)
Hi Russ, > > - A standards-track mechanism that allows an intermediary > device, such > > as a firewall or intrusion detection system, to easily and reliably > > determine whether an ESP packet is encrypted with the NULL > cipher; and > > if it is, determine the location of the actual paylo

Re: [IPsec] DISCUSS: draft-ietf-ipsecme-traffic-visibility

2009-12-28 Thread Bhatia, Manav (Manav)
Yes, this was discussed in the WG (http://trac.tools.ietf.org/wg/ipsecme/trac/ticket/104) and the idea was this: We could have some malicious entity that could modify the offsets to ensure that the intermediaries don't parse a portion of the payload (which could contain malicious content) or in

Re: [IPsec] DISCUSS: draft-ietf-ipsecme-traffic-visibility

2009-12-21 Thread Bhatia, Manav (Manav)
+1 > -Original Message- > From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] > On Behalf Of Brian Swander > Sent: Tuesday, December 22, 2009 4.43 AM > To: Yaron Sheffer; Tero Kivinen; Jack Kohn > Cc: ipsec@ietf.org; Russ Housley > Subject: Re: [IPsec] DISCUSS: draft-ietf-ipsecm

Re: [IPsec] DISCUSS: draft-ietf-ipsecme-traffic-visibility

2009-12-21 Thread Bhatia, Manav (Manav)
Tero, > The reason I am in favor of heuristics instead of WESP, is that > heuristics requires changes only on the middleboxes, we do not need to > make new extension that will affect all the end nodes supporting > IPsec. > > Also heuristics is not harmful, as it does not harm others, it is > simp

Re: [IPsec] Proposed work item: WESP extensibility - YES

2009-12-02 Thread Bhatia, Manav (Manav)
[mail snipped] > - If this proposal is accepted as a WG work item, > are you committing to review multiple versions of the draft? Yes > - Are you willing to contribute text to the draft? Yes > - Would you like to co-author it? Yes I believe the OAM extension described in the draft is useful and

Re: [IPsec] Ensuring future extensibility for WESP

2009-11-20 Thread Bhatia, Manav (Manav)
Hi Yaron, I am fine with these changes and i think we must have them to keep WESP extensible! Thanks, Manav From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of Yaron Sheffer Sent: Wednesday, November 18, 2009 1.00 PM To: IPsecme WG Subject

Re: [IPsec] WESP - Roadmap Ahead

2009-11-16 Thread Bhatia, Manav (Manav)
This is an implementation specific optimization that has already been solved in multiple implementations. Cheers, Manav > -Original Message- > From: Tero Kivinen [mailto:kivi...@iki.fi] > Sent: Monday, November 16, 2009 6.39 PM > To: Bhatia, Manav (Manav) > Cc: ipsec@iet

Re: [IPsec] WESP - Roadmap Ahead

2009-11-15 Thread Bhatia, Manav (Manav)
> > It will take several years before implementations start to implement > WESP, and even more years before hardware chips support WESP. Most of > the IPsec users are still using IKEv1, even when we published IKEv2 > 2005, i.e. 4 years ago. And IKEv2 draft was finished and publication > was requ

Re: [IPsec] WESP - Roadmap Ahead

2009-11-12 Thread Bhatia, Manav (Manav)
t the SAD lookup fail? Cheers, Manav > -Original Message- > From: Richard Graveman [mailto:rfgrave...@gmail.com] > Sent: Friday, November 13, 2009 7.07 AM > To: Bhatia, Manav (Manav) > Cc: Daniel Migault; ipsec@ietf.org; Stephen Kent; Kaeo; > mer...@core3.amsl.com

Re: [IPsec] WESP - Roadmap Ahead

2009-11-12 Thread Bhatia, Manav (Manav)
> > > >So what fields does AH protect: > > > >Version, Payload length, Next Header, Source IP and dest IP > > you forgot IPv4 and IPv6 options that have predictable values at the > destination Lets start with the IPv6 Type 0 Route Header (aka "Source Routing" in v4 parlance), which is a mutabl

Re: [IPsec] WESP - Roadmap Ahead

2009-11-12 Thread Bhatia, Manav (Manav)
M To: Jack Kohn Cc: Stephen Kent; ipsec@ietf.org; Bhatia, Manav (Manav); Merike Kaeo Subject: Re: [IPsec] WESP - Roadmap Ahead On Thu, Nov 12, 2009 at 5:30 AM, Jack Kohn wrote: > > Whoops, I was wrong. I looked at 4552 an

Re: [IPsec] WESP - Roadmap Ahead

2009-11-11 Thread Bhatia, Manav (Manav)
e flip side, in practical implementations, most vendors I > know of started off with AH being used for OSPFv3 and I doubt in > practice people are using ESP-Null. Would love to be wrong here :) > > - merike > > On Nov 11, 2009, at 7:28 PM, Stephen Kent wrote: > > >

Re: [IPsec] WESP - Roadmap Ahead

2009-11-11 Thread Bhatia, Manav (Manav)
this is really true. I know of at least two major vendors that use ESP-NULL and one of them doesn't even support AH. Cheers, Manav > > - merike > > On Nov 11, 2009, at 7:28 PM, Stephen Kent wrote: > > > At 7:44 AM +0530 11/12/09, Bhatia, Manav (Manav) wrote: > >>

Re: [IPsec] WESP - Roadmap Ahead

2009-11-11 Thread Bhatia, Manav (Manav)
Steve, > I would have no problem deprecating AH in the context of the IPsec > architecture document, if others agree. It is less efficient than > ESP-NULL. However, other WGs have cited AH as the IPsec protocol of > choice for integrity/authentication in their environments, so there > will be

Re: [IPsec] WESP - Roadmap Ahead

2009-11-11 Thread Bhatia, Manav (Manav)
Scott, > From: ipsec-boun...@ietf.org On Behalf Of Scott C Moonen > Sent: Thursday, November 12, 2009 2.37 AM > To: Jack Kohn > Cc: ipsec@ietf.org; ipsec-boun...@ietf.org > Subject: Re: [IPsec] WESP - Roadmap Ahead > > Jack, I'm not sure it's clear yet whether WESP will be widely adopted.

Re: [IPsec] Relating the two ESP-null documents

2009-08-18 Thread Bhatia, Manav (Manav)
Works for me too! Cheers, Manav > -Original Message- > From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] > On Behalf Of Grewal, Ken > Sent: Tuesday, August 18, 2009 10.03 PM > To: Yaron Sheffer; ipsec@ietf.org > Subject: Re: [IPsec] Relating the two ESP-null documents > > Wo

Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

2009-07-16 Thread Bhatia, Manav (Manav)
then simply deriving the state from the Next Header field. Cheers, Manav From: Yaron Sheffer [mailto:yar...@checkpoint.com] Sent: Thursday, July 16, 2009 2.21 PM To: Bhatia, Manav (Manav); Grewal, Ken; QIU Ying; ipsec@ietf.org Subject: RE: [IPsec] WG Last Call:

Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

2009-07-16 Thread Bhatia, Manav (Manav)
2009 1.01 PM To: QIU Ying; Bhatia, Manav (Manav); Grewal, Ken; Yaron Sheffer; ipsec@ietf.org Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05 Oh, maybe I misunderstood Manav's thought. Perhaps Manav's meaning is that WESP carries an ESP-null packet which trailer

Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

2009-07-15 Thread Bhatia, Manav (Manav)
We can use ESP as the next header to denote encryption being used as long as we are sure that we will never have an ESP packet inside the WESP encapsulation. In my view there is nothing that precludes that from happening, which means that we may have some corner cases where WESP may actually be

Re: [IPsec] Next Header field in WESP header

2009-05-12 Thread Bhatia, Manav (Manav)
> > There are a lot of boxes deployed in the field that cant do what you > > seem to be suggesting. > > Those deployed boxes will need updates anyways, as they do not support > WESP either... I had meant that there are boxes currently deployed in the field which would have HW capable of only

Re: [IPsec] Next Header field in WESP header

2009-05-12 Thread Bhatia, Manav (Manav)
et. Is there an issue in keeping "Next Header" in the WESP header? I see an advantage in doing so. Would like to hear arguments against it! Cheers, Manav > -Original Message- > From: Tero Kivinen [mailto:kivi...@iki.fi] > Sent: Tuesday, May 12, 2009 2.31 PM > To

[IPsec] Next Header field in WESP header

2009-05-11 Thread Bhatia, Manav (Manav)
Hi, I'd personally like to see the "Next Header" field retained in the WESP header. It becomes extremely easy for the ASICs (even off the shelf ones like Broadcom, Wintegra, etc) to look at a fixed offset in the packet for a particular byte pattern and decide on what it needs to do with that pa

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-13 Thread Bhatia, Manav (Manav)
> > > Yes, but I do not really think people are going to solve > those using > > > ESP-NULL. I think they must move to encrypted ESP to provide > > > confidentiality also, and that makes the need for > ESP-NULL visibility > > > even less. > > > > I disagree. With AH as a MAY and ESP as MUST in I

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-12 Thread Bhatia, Manav (Manav)
> > > BTW, insider threats are on the rise according to various public > > reports, so should not be discounted. This is one of the motivations > > of employing security, even within the Enterprise. > > Yes, but I do not really think people are going to solve those using > ESP-NULL. I think they