Guidelines for Specifying the Use of IPsec Version 2
RFC 5406
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
10 | (System) | post-migration administrative database adjustment to the No Objection position for David Ward |
2012-08-22
|
10 | (System) | post-migration administrative database adjustment to the No Objection position for Jari Arkko |
2012-08-22
|
10 | (System) | post-migration administrative database adjustment to the Yes position for Tim Polk |
2012-08-22
|
10 | (System) | post-migration administrative database adjustment to the No Objection position for Lars Eggert |
2012-08-22
|
10 | (System) | post-migration administrative database adjustment to the No Objection position for Mark Townsley |
2012-08-22
|
10 | (System) | post-migration administrative database adjustment to the No Objection position for Ross Callon |
2009-02-25
|
10 | Cindy Morgan | State Changes to RFC Published from RFC Ed Queue by Cindy Morgan |
2009-02-25
|
10 | Cindy Morgan | [Note]: 'RFC 5406; BCP 146 ' added by Cindy Morgan |
2009-02-25
|
10 | (System) | RFC published |
2008-08-15
|
10 | Cindy Morgan | State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan |
2008-08-15
|
10 | (System) | IANA Action state changed to No IC from In Progress |
2008-08-15
|
10 | (System) | IANA Action state changed to In Progress |
2008-08-15
|
10 | Cindy Morgan | IESG state changed to Approved-announcement sent |
2008-08-15
|
10 | Cindy Morgan | IESG has approved the document |
2008-08-15
|
10 | Cindy Morgan | Closed "Approve" ballot |
2008-08-15
|
10 | Cindy Morgan | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Cindy Morgan |
2008-08-15
|
10 | David Ward | [Ballot Position Update] Position for David Ward has been changed to No Objection from Discuss by David Ward |
2008-08-14
|
10 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to Yes from Undefined by Tim Polk |
2008-08-14
|
10 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk |
2008-08-03
|
10 | (System) | New version available: draft-bellovin-useipsec-10.txt |
2008-07-31
|
10 | Ross Callon | [Ballot Position Update] Position for Ross Callon has been changed to No Objection from Discuss by Ross Callon |
2008-07-11
|
10 | Ross Callon | [Ballot discuss] The introductions says: This document offers some guidance on when IPsec should and should not be specified. However, I didn't see … [Ballot discuss] The introductions says: This document offers some guidance on when IPsec should and should not be specified. However, I didn't see any guidance regarding the types of problems that IPsec doesn't protect against (which needs to be an input to "...when IPsec should and should not be specified"). As one example, I understand that IPsec could be used in routing protocols to protect against attacks that in theory could possibly occur. However, the vast majority of attacks that I have heard have actually occurred against routers fall into three categories: (i) DDOS against the control plane; (ii) Bad password selection; (iii) Accidental mis-configuration by well-intended and properly authorized network operators. IPsec doesn't protect against any of these. In fact, in order to protect against (i), it is at least desirable to set things up so that hackers can't send any packet *to* the router's control plane at all, which reduces the value that results from authentication of packets to the router's control plane. Also, use of IPsec on packets to the router's control plane can greatly magnify the effect of any DDOS attack against the control plane. If we are going to be talking about *mandating* security mechanisms for use in routing protocols (BGP is used as an example in this document -- a good example since IPsec is in fact currently used in this way in some cases), and if IPsec is the only security mechanism discussed in the document, then I think that we need a more balanced discussion of what can, and what cannot, be accomplished by IPsec. In addition, the document talks about automated key management. My understanding is that there is no standards track method currently defined that would allow automated key management between multiple systems interconnected via an underlying multicast or point to multipoint service. Thus we can't mandate, or even use, AKM for some of the routing area protocols (such as OSPF and IS-IS) since they transmit packets in some cases directly between multiple systems in this manner. This leads to the question: Who is the intended audience for this document? It seems clear that it is not security experts, since in general security experts (and even many non-security experts) will already fully understand the entirely reasonable main point that "Just Use IPsec" is very much *not* a valid "security considerations" section for any protocol specification. Thus I am inclined to think that the document audience must be people who are experts in other areas, but who are not security experts, who are trying to figure out how to write the security considerations section of a protocol specification. After reading this document they might have an improved understanding of why writing "just use IPsec" is not sufficient, but they are not going to have any clue what they actually need to write into their document. It is likely that another impediment to authors who are experts in other areas (NOT security experts) writing the security considerations section of their document is that they might not fully understand how security protocols could or might be used (for example, whether IPsec and associated key management protocols can operate using *only* packet exchange between directly attached systems, or if there needs to be packets exchanged with other not-directly-attached systems). Significantly more guidance is needed. I see this document clearly making the case that "just use IPsec" is not sufficient. However, I don't see it as being sufficient in the more important point of helping authors understand what they need to write instead. |
2008-07-11
|
10 | Ross Callon | [Ballot discuss] The introductions says: This document offers some guidance on when IPsec should and should not be specified. However, I didn't see … [Ballot discuss] The introductions says: This document offers some guidance on when IPsec should and should not be specified. However, I didn't see any guidance regarding the types of problems that IPsec doesn't protect against (which needs to be an input to "...when IPsec should and should not be specified"). As one example, I understand that IPsec could be used in routing protocols to protect against attacks that in theory could possibly occur. However, the vast majority of attacks that I have heard have actually occurred against routers fall into three categories: (i) DDOS against the control plane; (ii) Bad password selection; (iii) Accidental mis-configuration by well-intended and properly authorized network operators. IPsec doesn't protect against any of these. In fact, in order to protect against (i), it is at least desirable to set things up so that hackers can't send any packet *to* the router's control plane at all, which reduces the value that results from authentication of packets to the router's control plane. Also, use of IPsec on packets to the router's control plane can greatly magnify the effect of any DDOS attack against the control plane. If we are going to be talking about *mandating* security mechanisms for use in routing protocols (BGP is used as an example in this document -- a good example since IPsec is in fact currently used in this way in some cases), and if IPsec is the only security mechanism discussed in the document, then I think that we need a more balanced discussion of what can, and what cannot, be accomplished by IPsec. In addition, the document talks about automated key management. My understanding is that there is no standards track method currently defined that would allow automated key management between multiple systems interconnected via an underlying multicast or point to multipoint service. Thus we can't mandate, or even use, AKM for some of the routing area protocols (such as OSPF and IS-IS) since they transmit packets in some cases directly between multiple systems in this manner. This leads to the question: Who is the intended audience for this document? It seems clear that it is not security experts, since in general security experts (and even many non-security experts) will already fully understand the entirely reasonable main point that "Just Use IPsec" is very much *not* a valid "security considerations" section for any protocol specification. Thus I am inclined to think that the document audience must be people who are experts in other areas, but who are not security experts, who are trying to figure out how to write the security considerations section of a protocol specification. After reading this document they might have an improved understanding of why writing "just use IPsec" is not sufficient, but they are not going to have any clue what they actually need to write into their document. It is likely that another impediment to authors who are experts in other areas (NOT security experts) writing the security considerations section of their document is that they might not fully understand how security protocols could or might be used (for example, whether IPsec and associated key management protocols can operate using *only* packet exchange between directly attached systems, or if there needs to be packets exchanged with other not-directly-attached systems. Significantly more guidance is needed. I see this document clearly making the case that "just use IPsec" is not sufficient. However, I don't see it as being sufficient in the more important point of helping authors understand what they need to write instead. |
2008-07-10
|
09 | (System) | New version available: draft-bellovin-useipsec-09.txt |
2008-07-10
|
08 | (System) | New version available: draft-bellovin-useipsec-08.txt |
2008-03-10
|
10 | Tim Polk | [Ballot discuss] [As part of the AD transition, I am assuming Sam Hartman's discuss.] Also, please note that section 8 of this specification only coversn … [Ballot discuss] [As part of the AD transition, I am assuming Sam Hartman's discuss.] Also, please note that section 8 of this specification only coversn IKEV1. There are additional requirements for what needs to be specified for IKEV2 not covered in your spec. You need to make it clear that this only covers 2401-based IPsec. The current text implies that applications could simply say to use IKEV2. If they do that they are outside the scope of this BCP. That needs to be made clear. In particular, the reference to EAP for IKEV2 and the claim that you need to specify what version of IKE is inappropriate in this document. |
2008-03-10
|
10 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to Discuss from No Objection by Tim Polk |
2008-03-10
|
10 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Yes by Tim Polk |
2007-12-07
|
10 | Mark Townsley | [Ballot Position Update] Position for Mark Townsley has been changed to No Objection from Discuss by Mark Townsley |
2007-12-02
|
10 | Sam Hartman | [Ballot discuss] Also, please note that section 8 of this specification only coversn IKEV1. There are additional requirements for what needs to be specified for … [Ballot discuss] Also, please note that section 8 of this specification only coversn IKEV1. There are additional requirements for what needs to be specified for IKEV2 not covered in your spec. You need to make it clear that this only covers 2401-based IPsec. The current text implies that applications could simply say to use IKEV2. If they do that they are outside the scope of this BCP. That needs to be made clear. In particular, the reference to EAP for IKEV2 and the claim that you need to specify what version of IKE is inappropriate in this document. |
2007-10-26
|
10 | Sam Hartman | [Ballot discuss] Also, please note that section 8 of this specification only coversn IKEV1. There are additional requirements for what needs to be specified for … [Ballot discuss] Also, please note that section 8 of this specification only coversn IKEV1. There are additional requirements for what needs to be specified for IKEV2 not covered in your spec. You need to make it clear that this only covers 2401-based IPsec. The current text implies that applications could simply say to use IKEV2. If they do that they are outside the scope of this BCP. That needs to be made clear. |
2007-10-12
|
10 | Tim Polk | [Ballot Position Update] New position, Yes, has been recorded by Tim Polk |
2007-10-11
|
10 | David Ward | [Ballot discuss] If this document is changed to state that it is the thought process that a protocol designer needs to go through if they … [Ballot discuss] If this document is changed to state that it is the thought process that a protocol designer needs to go through if they want to secure their protocol with IPsec, it would be more appropriate. It is unclear in the intro or example sections that what is written is illustrative or prescriptive. It needs to be clear via changing the title and text in the draft that this is for illustrative purposes only. |
2007-10-11
|
10 | David Ward | [Ballot Position Update] New position, Discuss, has been recorded by David Ward |
2007-10-09
|
10 | Jari Arkko | [Ballot comment] Only partially tongue-in-cheek, perhaps the document should be clearer in making a recommendation on the use of IPsec for applications. For instance, "The … [Ballot comment] Only partially tongue-in-cheek, perhaps the document should be clearer in making a recommendation on the use of IPsec for applications. For instance, "The use of IPsec as a security mechanism for any other purpose than VPNs is NOT RECOMMENDED, and should only be attempted after careful analysis that such usage is indeed the best option." |
2007-10-09
|
10 | Jari Arkko | [Ballot Position Update] Position for Jari Arkko has been changed to No Objection from Discuss by Jari Arkko |
2007-10-08
|
10 | Lars Eggert | [Ballot Position Update] Position for Lars Eggert has been changed to No Objection from Discuss by Lars Eggert |
2007-10-08
|
10 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2007-10-08
|
07 | (System) | New version available: draft-bellovin-useipsec-07.txt |
2007-08-30
|
10 | Chris Newman | [Ballot comment] Carrying forward Ted's no objection vote. |
2007-08-30
|
10 | Chris Newman | [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman |
2007-08-03
|
10 | Tim Polk | Status date has been changed to 2007-08-10 from 2007-05-15 |
2007-05-02
|
10 | Tim Polk | Status date has been changed to 2007-05-15 from |
2007-04-13
|
10 | Tim Polk | Responsible AD has been changed to Tim Polk from Russ Housley |
2007-03-08
|
10 | Amy Vezza | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza |
2007-03-08
|
10 | Mark Townsley | [Ballot comment] Comment copied from Ted Hardie as he is leaving soon, this is related to my Discuss. [2007-03-07] I have a small concern that … [Ballot comment] Comment copied from Ted Hardie as he is leaving soon, this is related to my Discuss. [2007-03-07] I have a small concern that the tone of the document may turn off the intended audience, by appearing to talk down to them. Two examples, along with concrete suggestions, are given below, but the problem is fairly general and other approaches might have the same result. This comment is, of course, non-blocking and the document can go forward without any change if the author and IESG are not concerned with this issue. OLD: 2. WARNING The design of security protocols is a subtle and difficult art. The cautions here about specifying use of IPsec should NOT be taken to mean that that you should invent your own new security protocol for each new application. If IPsec is a bad choice, use another standardized, well-understood security protocol. Don't roll your own. NEW: 2. WARNING The cautions here about specifying use of IPsec should NOT be taken to mean that that you should invent your own new security protocol for each new application. If IPsec is a bad choice, using another standardized, well-understood security protocol will generally give the best results for both implementation and deployment. The design of security protocols is a difficult art; rolling out a new protocol will require extensive work to confirm its security properties and will incur both delay and uncertainty. OLD: Selectors The issue of selectors is easy. BGP already runs between manually-configured pairs of hosts on TCP port 179. The appropriate selector would be the pair of BGP speakers, for that port only. Note that the router's "loopback address" is almost certainly the address to use. Mode Clearly, transport mode is the proper choice. The information being communicated is generally not confidential, so encryption need not be used. Either AH or ESP can be used; if ESP is used, the sender's IP address would need to be checked against the IP address asserted in the key management exchange. (This check is mandated by [RFC2401].) For the sake of interoperability, the RFC author should pick one. NEW: Selectors BGP runs between manually-configured pairs of hosts on TCP port 179. The appropriate selector would be the pair of BGP speakers, for that port only. Note that the router's "loopback address" is almost certainly the address to use. Mode Transport mode would likely be the proper choice if IPSec were used. The information being communicated is generally not confidential, so encryption need not be used. Either AH or ESP could be used; if ESP were used, the sender's IP address would need to be checked against the IP address asserted in the key management exchange. (This check is mandated by [RFC2401].) For the sake of interoperability, either AH or ESP would need to be mandatory to implement. |
2007-03-08
|
10 | Jari Arkko | [Ballot comment] > A new, simpler version of IKE has been > approved, but there are few if any deployments [RFC4306]. Is this … [Ballot comment] > A new, simpler version of IKE has been > approved, but there are few if any deployments [RFC4306]. Is this still true at the time this is being approved? And finally, only partially tongue-in-cheek, perhaps the document should be clearer in making a recommendation on the use of IPsec for applications. For instance, "The use of IPsec as a security mechanism for any other purpose than VPNs is NOT RECOMMENDED, and should only be attempted after careful analysis that such usage is indeed the best option." |
2007-03-08
|
10 | Jari Arkko | [Ballot discuss] This is a great and much needed document. However, with my (mostly negative) experience of a dozen or so attempts to use IPsec … [Ballot discuss] This is a great and much needed document. However, with my (mostly negative) experience of a dozen or so attempts to use IPsec for specific applications, I felt that it made rather weak assertions where much stronger language should have been used. Specific points below: > All variants of IPsec have problems with NAT boxes -- see [RFC3715] > for details -- but AH is considerably more troublesome. In > environments where there is substantial likelihood that the two end- > points will be separated by a NAT box, AH should be avoided. Note > that [RFC3948] is for ESP only, and cannot be used for AH. I would suggest that this be written in a slightly different way that emphasizes the need to use IPsec NAT traversal unless it can be shown that no NATs are involved. In addition, you should point to remaining problems (if any) for running ESP with NAT-T, along with the inability to use AH. > It is, in some sense, a misnomer to speak of the API as a part of > IPsec, since that piece is missing on many systems. To the extent > that it does exist, it isn't standardized. The problem is simple: it > is difficult or impossible to request IPsec protection, or to tell if > was used for given inbound packets or connections. This is a bit weak. A suggested reformulation: Applications have rarely access to an API that they could use to interact with the IPsec security services. To the extent that APIs do exist, they have not been standardized. This is problematic in a number of ways: o Applications programmers are unable to "turn on" IPsec protection automatically, and have to rely on external measures, such as manual administration. It becomes impossible to produce an appliation that is by default secure. o Applications are unable to verify that IPsec services are being used underneath. o Applications are unaware of the specific identities and properties of the protected channel provided by IPsec. For instance, the IPsec key management mechanisms may be aware of the identity and authorization of the peer, but this information cannot be used by the application, nor linked to application-level decisions, such as access to resources reserved to the entity identified by this identity. In contrast, security services such as TLS that operate on higher layers are often able to provide these functions. > Even for host-to-host use, IPsec availability (and experience, and > ease of use) has generally been for VPNs. Hosts that support IPsec > for VPN use do not always support it on a point-to-point basis, > especially via a stable, well-defined API or user interface. s/do not always/rarely/ > Section 4.4 of [RFC2401] describes the Security Policy Database (SPD) > and "selectors" used to decide what traffic should be protected by > IPsec. Choices include source and destination addresses (or address > ranges), protocol numbers (i.e., 6 for TCP and 17 for UDP), and port > numbers for TCP and UDP. Protocols whose protection requirements > cannot be described in such terms are poorer candidates for IPsec in > particular, it becomes impossible to apply protection at any finer > grain than "destination host". In a world that runs to a large extent on dynamically assigned addresses and often uses dynamically assigned port numbers as well, an all-or-nothing policy for VPNs works well but other policies can be difficult to create. > 3.3. Key Management This does not discuss situations where key management cannot easily be accomplished using the standard IPsec key management mechanisms. For instance, there are chicken-and-egg problems in applying IKE to low-level communication tools that attempt to establish a contact or discover peers. RFC 2461 specified "just use IPsec" for Neighbor Discovery. Among the many limitations of that specification was that you couldn't possibly use IKE for setting up the security assocations for ND communication, because to use IKE you would have had to be able to send packets, which in turn would have required that ND had already run. > f. What form of authentication should be used? Choices include pre- > shared secrets, certificates, and (for IKEv2) an EAP exchange > [RFC3748]. Shouldn't we talk about authorization here as well? The fact that my device has a company certificate does not mean that it can use any application or any resource. As an example, Mobile IPv6 has had to deal with authorizing the use of a specific home address, to avoid other, also certified, users from hijacking that address. Suggested addition: f2. How are the participants authorized to perform the operations that they request? For instance, are all devices with a certificate from a particular source allowed to use any application with with IPsec or access any resource? > Security Policy Connections should be accepted only from the > designated peer. Question. What if the router has many functions, e.g., BGP, management, VPN gateway, statistics collection? Would you need RFC 4301 PAD to distinguish the different credentials needed for different tasks? Its unclear to me how this is done in RFC 2401 space. |
2007-03-08
|
10 | Jari Arkko | [Ballot Position Update] New position, Discuss, has been recorded by Jari Arkko |
2007-03-08
|
10 | Mark Townsley | [Ballot discuss] I share Ted's concern in his Comment, but consider the mandate of "Don't roll your own" too strong for a BCP and worthy … [Ballot discuss] I share Ted's concern in his Comment, but consider the mandate of "Don't roll your own" too strong for a BCP and worthy of a DISCUSS. There are times when building in security into a protocol is a Good Thing. As Steven indicates, security is a difficult art, and as such I think that even this type of warning is not so black and white as he states here. Ted's suggested text on this would satisfy my discuss. |
2007-03-08
|
10 | Mark Townsley | [Ballot Position Update] New position, Discuss, has been recorded by Mark Townsley |
2007-03-08
|
10 | Amy Vezza | State Changes to IESG Evaluation from IESG Evaluation - Defer by Amy Vezza |
2007-03-08
|
10 | Ross Callon | [Ballot discuss] The introductions says: This document offers some guidance on when IPsec should and should not be specified. However, I didn't see … [Ballot discuss] The introductions says: This document offers some guidance on when IPsec should and should not be specified. However, I didn't see any guidance regarding the types of problems that IPsec doesn't protect against. As one example, I understand that IPsec could be used in routing protocols to protect against attacks that in theory could possibly occur. However, the vast majority of attacks that I have heard about against routers fall into three categories: (i) DDOS against the control plane; (ii) Bad password selection; (iii) Accidental mis-configuration by well-intended and properly authorized network operators. IPsec doesn't protect against any of these. In fact, in order to protect against (i), it is at least desirable to set things up so that hackers can't send any packet *to* the router's control plane at all, which reduces the value that results from authentication of packets to the router's control plane. Also, use of IPsec on packets to the router's control plane will magnify the effect of any DDOS attack against the control plane. If we are going to be talking about *mandating* security mechanisms for use in routing protocols (BGP is used as an example in this document), and if IPsec is the only security mechanism discussed in the document, then I think that we need a more balanced discussion of what can, and what cannot, be accomplished by IPsec. |
2007-03-08
|
10 | Ross Callon | [Ballot discuss] The introductions says: This document offers some guidance on when IPsec should and should not be specified. However, I didn't see … [Ballot discuss] The introductions says: This document offers some guidance on when IPsec should and should not be specified. However, I didn't see any guidance regarding the types of problems that IPsec doesn't protect against. As one example, I understand that IPsec could be used in routing protocols to protect against attacks that in theory could possibly occur. However, the vast majority of attacks that I have heard about against routers fall into three categories: (i) DDOS against the control plane; (ii) Bad password selection; (iii) Accidental mis-configuration by well-intended and properly authorized network operators. IPsec doesn't protect against any of these. In fact, in order to protect against (i), it is at least desirable to set things up so that hackers can't send any packet *to* the router's control plane at all, which reduces the value that results from authentication of packets to the router's control plane. Also, use of IPsec on packets to the router's control plane will magnify the effect of any DDOS attack against the control plane. If we are going to be talking about *mandating* security mechanisms for use in routing protocols (BGP is used as an example in this document), and if IPsec is the only security mechanism discussed in the document, then I think that we need a more balanced discussion of what can, and what cannot, be accomplished by IPsec. |
2007-03-08
|
10 | Ross Callon | [Ballot Position Update] New position, Discuss, has been recorded by Ross Callon |
2007-03-08
|
10 | Jon Peterson | [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson |
2007-03-08
|
10 | Bill Fenner | [Ballot comment] I realize this has been in the works for some time now, but it seems a little odd that it only talks about … [Ballot comment] I realize this has been in the works for some time now, but it seems a little odd that it only talks about "ipsec v2" when we are seeing security reviews criticizing documents for not having adapted the "ipsec v3" model. It's excellent to have a guidance document, but will this document guide authors towards something that will cause problems at secdir review time? |
2007-03-08
|
10 | Bill Fenner | [Ballot Position Update] New position, No Objection, has been recorded by Bill Fenner |
2007-03-08
|
10 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu |
2007-03-08
|
10 | Dan Romascanu | [Ballot comment] The Introduction Section says: 'This document describes how to specify the use of IPsec Version 2 [RFC2401], including ESPv2 [ … [Ballot comment] The Introduction Section says: 'This document describes how to specify the use of IPsec Version 2 [RFC2401], including ESPv2 [RFC2406], AHv2 [RFC2402], and IKEv1 [RFC2409]. A separate document will describe the IPsec Version3 suite [RFC4301] [RFC4302] [RFC4303] [RFC4306].' Should not the title reflect this and be 'Guidelines for Mandating the Use of IPsec Version 2', while the future separate document will refer to IPsec Version 3? |
2007-03-07
|
10 | David Kessens | [Ballot Position Update] New position, No Objection, has been recorded by David Kessens |
2007-03-07
|
10 | Ted Hardie | [Ballot comment] I have a small concern that the tone of the document may turn off the intended audience, by appearing to talk down to … [Ballot comment] I have a small concern that the tone of the document may turn off the intended audience, by appearing to talk down to them. Two examples, along with concrete suggestions, are given below, but the problem is fairly general and other approaches might have the same result. This comment is, of course, non-blocking and the document can go forward without any change if the author and IESG are not concerned with this issue. OLD: 2. WARNING The design of security protocols is a subtle and difficult art. The cautions here about specifying use of IPsec should NOT be taken to mean that that you should invent your own new security protocol for each new application. If IPsec is a bad choice, use another standardized, well-understood security protocol. Don't roll your own. NEW: 2. WARNING The cautions here about specifying use of IPsec should NOT be taken to mean that that you should invent your own new security protocol for each new application. If IPsec is a bad choice, using another standardized, well-understood security protocol will generally give the best results for both implementation and deployment. The design of security protocols is a difficult art; rolling out a new protocol will require extensive work to confirm its security properties and will incur both delay and uncertainty. OLD: Selectors The issue of selectors is easy. BGP already runs between manually-configured pairs of hosts on TCP port 179. The appropriate selector would be the pair of BGP speakers, for that port only. Note that the router's "loopback address" is almost certainly the address to use. Mode Clearly, transport mode is the proper choice. The information being communicated is generally not confidential, so encryption need not be used. Either AH or ESP can be used; if ESP is used, the sender's IP address would need to be checked against the IP address asserted in the key management exchange. (This check is mandated by [RFC2401].) For the sake of interoperability, the RFC author should pick one. NEW: Selectors BGP runs between manually-configured pairs of hosts on TCP port 179. The appropriate selector would be the pair of BGP speakers, for that port only. Note that the router's "loopback address" is almost certainly the address to use. Mode Transport mode would likely be the proper choice if IPSec were used. The information being communicated is generally not confidential, so encryption need not be used. Either AH or ESP could be used; if ESP were used, the sender's IP address would need to be checked against the IP address asserted in the key management exchange. (This check is mandated by [RFC2401].) For the sake of interoperability, either AH or ESP would need to be mandatory to implement. |
2007-03-07
|
10 | Ted Hardie | [Ballot Position Update] New position, No Objection, has been recorded by Ted Hardie |
2007-03-07
|
10 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund |
2007-03-06
|
10 | Cullen Jennings | [Ballot comment] I liked this document and think it will be very useful but one line made me wonder if it really was true. The … [Ballot comment] I liked this document and think it will be very useful but one line made me wonder if it really was true. The document says "Furthermore, there is no global PKI for the Internet and probably never will be one." I would venture a wild guess that 100's of millions of people covering every country in the world regularly use HTTPS with approximately the root CA list Internet Explorer provides to achieve some security goals. I can understand the argument that this is not a good PKI, but I have a very hard time imagining why it is not a global PKI. Perhaps there is some special meaning in the terms of art that I do not understand but if that is the case, I suspect that the target audience for this document would not understand them either. That said, I don't think changing this line one way or the other changes the value of this document. |
2007-03-06
|
10 | Cullen Jennings | [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings |
2007-03-05
|
10 | Sam Hartman | [Ballot comment] Kink has been defined and implementations are available; please update the text. One requirement of IPsec is that a server must define policy … [Ballot comment] Kink has been defined and implementations are available; please update the text. One requirement of IPsec is that a server must define policy entries that determine whether traffic will be protected ahead of time. This for example typically means that you cannot run a server that supports both secure and insecure traffic without using multiple ports. You should point this out. |
2007-03-05
|
10 | Sam Hartman | [Ballot discuss] I don't understand what the following text means: > d. What security policy database entry types should be used by the > … [Ballot discuss] I don't understand what the following text means: > d. What security policy database entry types should be used by the > responder (i.e., the server) when deciding whether or not to > accept the IPsec connection request? Also, please note that section 8 of this specification only covers IKEV1. There are additional requirements for what needs to be specified for IKEV2 not covered in your spec. |
2007-03-05
|
10 | Sam Hartman | [Ballot Position Update] New position, Discuss, has been recorded by Sam Hartman |
2007-03-05
|
10 | Brian Carpenter | [Ballot Position Update] New position, No Objection, has been recorded by Brian Carpenter |
2007-03-02
|
10 | Lars Eggert | [Ballot discuss] Section 12.1., paragraph 8: > [RFC3715] Aboba, B. and W. Dixon, "IPsec-Network Address Translation > … [Ballot discuss] Section 12.1., paragraph 8: > [RFC3715] Aboba, B. and W. Dixon, "IPsec-Network Address Translation > (NAT) Compatibility Requirements", RFC 3715, March 2004. DISCUSS: Is a DOWNREF. But from the way it is cited ("all variants of IPsec have problems with NAT boxes -- see [RFC3715]"), this can probably safely become an informational reference. |
2007-03-02
|
10 | Lars Eggert | [Ballot Position Update] New position, Discuss, has been recorded by Lars Eggert |
2007-02-23
|
10 | (System) | Removed from agenda for telechat - 2007-02-22 |
2007-02-22
|
10 | Samuel Weiler | Request for Telechat review by SECDIR Completed. Reviewer: Nicolas Williams. |
2007-02-14
|
10 | Sam Hartman | State Changes to IESG Evaluation - Defer from IESG Evaluation by Sam Hartman |
2007-02-13
|
10 | Samuel Weiler | Request for Telechat review by SECDIR is assigned to Nicolas Williams |
2007-02-13
|
10 | Samuel Weiler | Request for Telechat review by SECDIR is assigned to Nicolas Williams |
2007-02-09
|
10 | Russ Housley | State Changes to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup by Russ Housley |
2007-02-09
|
10 | Russ Housley | Placed on agenda for telechat - 2007-02-22 by Russ Housley |
2007-02-08
|
10 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2007-02-08
|
06 | (System) | New version available: draft-bellovin-useipsec-06.txt |
2007-01-17
|
10 | Russ Housley | Status date has been changed to 2007-02-02 from |
2006-10-19
|
10 | Russ Housley | State Changes to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for AD Go-Ahead::AD Followup by Russ Housley |
2006-08-31
|
10 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2006-08-31
|
05 | (System) | New version available: draft-bellovin-useipsec-05.txt |
2006-07-20
|
10 | Russ Housley | State Changes to Waiting for AD Go-Ahead::Revised ID Needed from IESG Evaluation::Revised ID Needed by Russ Housley |
2006-07-20
|
10 | Russ Housley | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Russ Housley |
2006-07-09
|
10 | Russ Housley | State Changes to IESG Evaluation from Waiting for AD Go-Ahead::Revised ID Needed by Russ Housley |
2006-07-09
|
10 | Russ Housley | Status date has been changed to 2006-09-01 from |
2006-02-07
|
10 | Russ Housley | Steve has no time to work on this document until early March. He will tackle the IETF Last Call comments atthat time. |
2005-11-13
|
10 | Russ Housley | State Changes to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for AD Go-Ahead by Russ Housley |
2005-10-18
|
10 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2005-09-21
|
10 | Michelle Cotton | IANA Last Call Comments: No IANA Considerations section. We understand this document to have NO IANA Actions. |
2005-09-20
|
10 | Amy Vezza | Last call sent |
2005-09-20
|
10 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2005-09-20
|
10 | Russ Housley | State Change Notice email list have been change to smb@cs.columbia.edu from |
2005-09-20
|
10 | Russ Housley | Last Call was requested by Russ Housley |
2005-09-20
|
10 | Russ Housley | State Changes to Last Call Requested from AD Evaluation::AD Followup by Russ Housley |
2005-09-20
|
10 | Russ Housley | [Ballot Position Update] New position, Yes, has been recorded for Russ Housley |
2005-09-20
|
10 | Russ Housley | Ballot has been issued by Russ Housley |
2005-09-20
|
10 | Russ Housley | Created "Approve" ballot |
2005-09-20
|
10 | (System) | Ballot writeup text was added |
2005-09-20
|
10 | (System) | Last call text was added |
2005-09-20
|
10 | (System) | Ballot approval text was added |
2005-09-19
|
10 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2005-09-19
|
04 | (System) | New version available: draft-bellovin-useipsec-04.txt |
2004-03-25
|
03 | (System) | New version available: draft-bellovin-useipsec-03.txt |
2004-02-04
|
10 | Russ Housley | State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Russ Housley |
2003-12-17
|
10 | Russ Housley | State Changes to AD Evaluation from Publication Requested by Russ Housley |
2003-12-01
|
10 | Russ Housley | Draft Added by Russ Housley |
2003-10-23
|
02 | (System) | New version available: draft-bellovin-useipsec-02.txt |
2003-10-21
|
01 | (System) | New version available: draft-bellovin-useipsec-01.txt |
2002-10-29
|
00 | (System) | New version available: draft-bellovin-useipsec-00.txt |