[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [BEHAVE] Re: CPE equipments and stateful filters



On Jul 30, 2007, at 17:56, james woodyatt wrote:
On Jul 30, 2007, at 17:28, Dan Wing wrote:

<http://tools.ietf.org/html/draft-tschofenig-mip6-ice> describes how ICE might be useful for Mobile IPv6.

I'm reading this draft now.

If I understand how this might work, it would involve encapsulating IPsec ESP and IKE in UDP, to transit firewalls between MN's and their HA's, using conventional UDP state tracking.

We don't currently have any protocol whereby IKE decides to switch over to UDP encapsulation, except in the NAT-traversal case, do we? With IPv6, we still think we have no NAT, so tests for reflexive addresses to match IKE initiations will always succeed.

What triggers the switch to UDP encapsulation? The mobility layer trying to do STUN connectivity tests on the ESP protocol? Blech, but I guess it works most of the time. If it fails mysteriously, just try again-- that seems to be a common failure recovery method in human-centered systems. I can't say I approve of it. For one thing, I really don't like the idea of extending my implementations of IPsec and IKE to do STUN over protocol=50 and port=udp/500.

RFC 4487 describes additional issues, e.g. CN's reaching MN's that roam behind networks with firewalls. <http://tools.ietf.org/html/ draft-bajko-mip6-rrtfw> proposes a way to work around the RRT issue, which looks on its face to be an ugly but workable hack. It reminds me that <draft-ietf-v6ops-cpe-simple-security> needs to be very explicit about how to handle the mobility extension header.

Finally, <http://tools.ietf.org/html/draft-tschofenig-mip6-ice> seems not to care at all about the problem of home agents behind firewalls. RFC 4487 raises that issue, but I'm not seeing how M-ICE is supposed to address it. Did I miss something?

My head hurts trying to sort out all the questions I have about ways these approaches potentially might fail during incremental deployment. On the other hand, all this stuff seems a lot simpler-- though still pretty soul-killingly fragile-- with ALD in the mix. I still think we'd be better off without any SPF middleboxes. (Oh, by the way, I remember now why I'm not optimistic about firewalls helping keep denial-of-service traffic off first mile links. That's a topic for another message, though.)


--
james woodyatt <jhw@apple.com>
member of technical staff, communications engineering