[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [BEHAVE] Re: CPE equipments and stateful filters
On Jul 30, 2007, at 17:56, james woodyatt wrote:
On Jul 30, 2007, at 17:28, Dan Wing wrote:
<http://tools.ietf.org/html/draft-tschofenig-mip6-ice> describes
how ICE might be useful for Mobile IPv6.
I'm reading this draft now.
If I understand how this might work, it would involve encapsulating
IPsec ESP and IKE in UDP, to transit firewalls between MN's and their
HA's, using conventional UDP state tracking.
We don't currently have any protocol whereby IKE decides to switch
over to UDP encapsulation, except in the NAT-traversal case, do we?
With IPv6, we still think we have no NAT, so tests for reflexive
addresses to match IKE initiations will always succeed.
What triggers the switch to UDP encapsulation? The mobility layer
trying to do STUN connectivity tests on the ESP protocol? Blech, but
I guess it works most of the time. If it fails mysteriously, just
try again-- that seems to be a common failure recovery method in
human-centered systems. I can't say I approve of it. For one thing,
I really don't like the idea of extending my implementations of IPsec
and IKE to do STUN over protocol=50 and port=udp/500.
RFC 4487 describes additional issues, e.g. CN's reaching MN's that
roam behind networks with firewalls. <http://tools.ietf.org/html/
draft-bajko-mip6-rrtfw> proposes a way to work around the RRT issue,
which looks on its face to be an ugly but workable hack. It reminds
me that <draft-ietf-v6ops-cpe-simple-security> needs to be very
explicit about how to handle the mobility extension header.
Finally, <http://tools.ietf.org/html/draft-tschofenig-mip6-ice> seems
not to care at all about the problem of home agents behind
firewalls. RFC 4487 raises that issue, but I'm not seeing how M-ICE
is supposed to address it. Did I miss something?
My head hurts trying to sort out all the questions I have about ways
these approaches potentially might fail during incremental
deployment. On the other hand, all this stuff seems a lot simpler--
though still pretty soul-killingly fragile-- with ALD in the mix. I
still think we'd be better off without any SPF middleboxes. (Oh, by
the way, I remember now why I'm not optimistic about firewalls
helping keep denial-of-service traffic off first mile links. That's
a topic for another message, though.)
--
james woodyatt <jhw@apple.com>
member of technical staff, communications engineering