[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: visibility of identifier in shim6 payload packet (was: Re: IPsec !?...)



 In your previous mail you wrote:

   I assume that you are pointing out the visibility of the identifier
   in the data packet.  In case of SHIM6, if locator switch is performed
   at the SHIM layer, the source and destination address field of the
   IP header contain locators not the identifiers (in some case they
   might be identical, though).  Now, what implications would this have
   for existing IPsec system?  I assume your point is that BITW IPsec
   device will not be able to extract the information from the IP packet
   for protecting the traffic.  More specifically, BITW IPsec stack may
   want to take the traffic selector information from the packet.
   In this respect, there is a difference between MIP6 RO and SHIM6 in
   its relation to the IPsec.  In case of MIP6, the identifier (=home address)
   is contained in the extended field of the IP header (either in RH2
   or DSTOPT).  Not in SHIM6 case.  Is this the problem that you are
   pointing out?
   
=> yes, this is the main issue.

   Now, let me state my view on this.  I think that the current
   architectural model given in the SHIM6 base protocol document is
   fairly reasonable, and I think we should not change it.
   And I think the above issue is not relevant to security mechanism
   of the SHIM6 protocol (that's why i changed the subject).

=> yes, it is the other side of SHIM6/IPsec interactions.

   Moreover, I would see the above case (BITW) rather minor than
   major.  However, I should admit that I am not familiar with the
   real deployment of BITW IPsec and how common it is to extract
   the information from the packet reached to the BITW device.
   Could you provide me some input how common it is in the BITW
   IPsec scenairo to dynamically extract the information from the
   IP header of the packet?

=> it is always the case: as the BITW is at the wire level it has
only access to the bits on the wire.

   We may also think how much does it make much sense to run SHIM6 in
   case where the BITW device is attached to the host.

=> as IPsec and BITW is already part of the IP architecture, SHIM6
has to accomodate with them.

   BTW, according to RFC4301, BITW device itself
   is IP addressable normally.

=> yes, it has to be managed and perhaps to run IKE so it is better
to give it its own address. BUT this doesn't mean it is a router
(a security gateway in IPsec terminology).

   If this is the case, I tend to think
   that support by SHIM6 does not make much sense in those scenario,
   meaning that the concern is not serious.

=> I strongly disagree: there is no requirement to make IPsec BITWs easy
but there is a clear requirement to be compatible (i.e., not to make
them impossible).

   Anyway, if the concern is really serious,

=> it is, I expect you don't want a last call objection from the military
community and its vendors against the protocol document?

   then we may consider minor modification to
   the SHIM6 payload extension header so that it can provide
   identifier information for the BITW IPsec.  What do you think?
   
=> one way is to put the ULID in all packets. This solves this problem
and related firewall issues too (*). But it is clearly expensive.

   BTW, in case of MIP6, due to the visibility of the identifier
   information, some people are feeling privacy concern and trying
   to hide them from the packet on the wire (in MOBOPTS IPRG).

=> yes, this is the IPsec VPN tentation but multi-homing is very different
because the standard/initial mode hides nothing...

   So, I am feeling that there is no solution that fulfills everyone's
   requirement.  We should focus on the main target, IMHO.
   
=> the main target is to have a protocol which fits into the current
architecture (note this is not yet the case) and solves the problem
(still need to be proved).

Two other points:
 - one possible solution is to integrated the whole SHIM6 into the BITW
   device (i.e., have an IPsec+SHIM6 BITW). As the issue comes from the
   relative positions of the IPsec and SHIM6 sublayer, this makes sense.
 - (*) in MIPv6 the home address is in all packets and fragments for the
   benefit of firewalls (cf RFC 3775 6.3 page 53). IMHO SHIM6 has the same
   concern so a packet or fragment should be easily attached to a
   communication (here easily means without SHIM6 signaling spoofing,
   state handling, etc, both because it is clearly not so easy and
   because one can't assume an intermediate node can see all packets).

Regards

Francis.Dupont@fdupont.fr