[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Remove tunnel mode from ipsec-tunnels-02?
On Wed, 6 Sep 2006, Fred Baker wrote:
given that there are significant networks that operate in tunnel mode,
including both corporate VPNs and military networks that use tunnel mode
between encryption devices with a specific view to hiding interior addressing
and therefore military asset distribution from prying eyes, this proposal
seem profoundly silly.
Our assumption has been that transport mode is applied to a tunnel
interface (such as IPv6-in-IPv4, GRE etc). That hides the inner
addresses from those observers that would have been on-path in the
tunnel.
When IPsec tunnel mode is _NOT_ modelled as an interface, then this is
OK though IMHO suboptimal because you cannot in practice run neighbor
discovery, routing protocols, multicast etc. over such tunnels. Due
to the link-local issues mentioned previously, tunnel mode is not
something we can recommend when it's modelled as an interface.
If there is something you disagree with in the above two paragraphs,
maybe you should clarify what the deployment looks like, because there
are a lot of different variations how IPsec could be applied:
a) transport mode in host-to-host mode (end-to-end IPsec)
b) transport mode when applied to an IP tunnel interface (e.g.,
between security gateways or a security gateway and a node)
c) tunnel mode, not modelled as an interface
d) tunnel mode, modelled as an interface
a) is out of scope of this document. b) seems best option by far. c)
can also work but has more more limited applicability as routing
protocols, multicast, etc. don't work. There is no interoperable
standards solution for d) that wouldn't break IPv6 architecture hence
it's non-starter.
Maybe you could remind us why the v6ops working group is supposed to be
overriding the recommendation of the ipsec working group on how security is
supposed to work based on what is convenient to IPv6?
I don't see what's being overridden. IPsec architecture allows the
use of transport mode between a node and a security gateway. If the
use of tunnel mode is suboptimal, I don't see it as a problem to
recommend another approach instead.
--
Pekka Savola "You each name yourselves king, yet the
Netcore Oy kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings