One document matched: draft-bhatia-ipsecme-esp-null-00.txt


Internet Draft         Identifying ESP-NULL Packets       December 2008 
 
 
   Network Working Group                                   Manav Bhatia 
   Internet Draft                                        Alcatel-Lucent 
   Intended Status: Proposed Standard                                   
   Expires: May 2009                                                    
    
                       Identifying ESP-NULL Packets 
                                      
                   draft-bhatia-ipsecme-esp-null-00.txt 
                                      
    
   Status of this Memo 
    
   By submitting this Internet-Draft, each author represents that any 
   applicable patent or other IPR claims of which he or she is aware 
   have been or will be disclosed, and any of which he or she becomes 
   aware will be disclosed, in accordance with Section 6 of BCP 79. 
    
   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF), its areas, and its working groups.  Note that 
   other groups may also distribute working documents as Internet- 
   Drafts. 
    
   Internet-Drafts are draft documents valid for a maximum of six months 
   and may be updated, replaced, or obsoleted by other documents at any 
   time.  It is inappropriate to use Internet-Drafts as reference 
   material or to cite them other than as "work in progress." 
    
   The list of current Internet-Drafts can be accessed at 
   http://www.ietf.org/ietf/1id-abstracts.txt. 
    
   The list of Internet-Draft Shadow Directories can be accessed at 
   http://www.ietf.org/shadow.html. 
    
   This Internet-Draft will expire on May 2009. 
    
Abstract 
    
   Encapsulating Security Payload (ESP) [RFC4303] provides data 
   integrity protection, confidentiality and data origin authentication 
   for data transported in an IP packet.  
    
   There are various applications and protocols that do not require 
   confidentiality but only need data integrity assurance or data origin 
   authentication. Since ESP support is mandatory for IPSec, such 
   applications end up using ESP with NULL encryption. 
    
   However, because of the way ESP is defined, it is impossible for 
   firewalls and intermediate routers to differentiate between encrypted 
   ESP and ESP NULL packets by simply examining them. This poses 
  
 
Bhatia                     Expires April 2009                  [Page 1] 
Internet Draft         Identifying ESP-NULL Packets       December 2008 
 
 
   problems for the firewalls since such packets cannot be filtered and 
   identified. It poses a different set of problems for routers since 
   such packets cannot be properly filtered, classified and prioritized. 
    
   This document proposes an extension to ESP so that firewalls and 
   routers can disambiguate between ESP encrypted and ESP NULL encrypted 
   packets.  
    
Conventions used in this document 
    
   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this  
   document are to be interpreted as described in [RFC2119]. 
    
1. Introduction 
    
   ESP-NULL is used when confidentiality is not required and only source 
   authentication and data integrity assurance is desired.  
    
   IPSec mandates the use of ESP while keeps support for Authentication 
   Header (AH) [RFC4302] as optional. Thus, new protocols using IPSec 
   for data integrity also mandate the use of ESP-NULL. It is also 
   mandatory [RFC4835] for all ESP implementations to provide support 
   for ESP NULL encryption. Because of these factors a lot of vendors do 
   not implement AH and only support ESP-NULL for data integrity and 
   source authentication. The traffic using ESP-NULL is thus only going 
   to increase with time. 
    
   Firewalls and intermediate routers in the network find it impossible 
   to parse ESP packets since they have no idea whether the packet is 
   encrypted or not. They cannot for this reason implement filters and 
   access control lists (ACLs).  
    
   ACLs are highly desirable and used extensively by service providers 
   to block undesired traffic coming from other domains. 
    
   This draft therefore proposes an extension to ESP with which 
   identifying an ESP-NULL packet from an ESP encrypted packet becomes 
   trivial. It is backward compatible, therefore devices that do not 
   understand this extension would treat packets using this extension as 
   normal ESP packets.  
    
   The extension described in this draft is applicable for both the 
   tunnel and the transport modes of ESP. 
    
2. Explicitly Marking ESP NULL Packets 
 
   ESP-NULL packets, for both implementations based on [RFC2410] and 
   [RFC4543] MUST be sent with a well known, reserved SPI of 1. The 
  
 
Bhatia                     Expires April 2009                  [Page 2] 
Internet Draft         Identifying ESP-NULL Packets       December 2008 
 
 
   original SPI should be included as part of the payload. This is 
   encoded in the first 4 octets of the payload section of the ESP 
   header. An implementation MUST put the next-header and the ESP header 
                 th         th
   length as the 4  and the 5  octets of the payload. 
    
   Since the packet is not encrypted these fields would be sent in clear 
   text and would be visible to all. 
    
   An extended ESP packet using NULL encryption would thus look like 
   this: 
    
   0                   1                   2                   3 
   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  
   |        Reserved Security Parameters Index (RSPI) = 1          |  
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  
   |                      Sequence Number                          |  
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  
   |          Original Security Parameters Index (SPI)             |  
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  
   |  next-header  |  eESP HDRLen  |                               | 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               + 
   |                    Payload Data* (variable)                   |  
   ~                                                               ~  
   |                                                               |  
   +               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  
   |               |     Padding (0-255 bytes)                     |  
   +-+-+-+-+-+-+-+-+               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  
   |                               |  Pad Length   | Next Header   |  
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  
   |                  Authentication Data  (variable)              | 
   ~                                                               ~ 
   |                                                               | 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
                               Figure 1 
    
   Reserved Security Parameters Index (RSPI): Well known value that 
   should be given by IANA to indicate that it is an ESP-NULL packet.  
    
   next-header: This is a one octet field that indicates the next 
   protocol header. Explicitly mentioning this provides an easy access 
   to a HW parser to extract the upper layer protocol. 
    
   eESP HDRLen: This is a one octet field that gives the length of the 
   extended ESP header + IV (if mandated by the authentication 
   algorithm). It is an offset to the beginning of the payload data. 
    

  
 
Bhatia                     Expires April 2009                  [Page 3] 
Internet Draft         Identifying ESP-NULL Packets       December 2008 
 
 
   Intermediate nodes (routers, firewalls, etc) interested in inspecting 
   the packets en route can look at the SPI value at the start of the 
   ESP header. If there are unaware of this extension then this packet 
   would appear like a normal ESP packet. However, compliant 
   implementations will understand that this is an extended ESP packet 
   and would have enough information to be able to deep inspect the ESP-
   NULL packet. 
    
   The compliant end nodes (routers) can similarly parse the packet 
   easily. If the SPI value is 1, then it can extract the original SPI 
   from the payload and process the packet accordingly. 
    
3. Authenticating the Packets 
    
   All fields of the extended ESP header starting with the RSPI and 
   ending with the Next Header in the ESP trailer are included in the 
   ESP data integrity check. 
    
   The authentication data field is used to hold the result of the data 
   integrity check done on the ESP packet. The length of this field 
   depends on the authentication algorithm employed by the Security 
   Association (SA) used to process this packet.  
    
4. Acknowledgements  
     
   The author would like to thank Jack Kohn for his useful comments. 
    
5. IANA Considerations  
 
   IANA must assign a value that for Reserved SPI which will be used as 
   described above. The draft uses a value 1 to foster pre-standard 
   implementations. 
    
6. Security Considerations 
    
   This proposal neither increases nor decreases the security for ESP. 
   All considerations valid for ESP also apply here.  
    
7. References 
 
7.1 Normative References 
    
    
   [RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)",               
             RFC 4303, December 2005.   
    
   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate   
              Requirement Levels", RFC 2119, BCP 14, February 2001. 
    
  
 
Bhatia                     Expires April 2009                  [Page 4] 
Internet Draft         Identifying ESP-NULL Packets       December 2008 
 
 
   [RFC2410] Glenn, R., and Kent, S., "The NULL Encryption Algorithm and  
             its Use With IPsec", RFC 2410, November 1998. 
    
   [RFC4543] McGrew, D. and Viega, J., "The Use of Galois Message  
             Authentication Code (GMAC) in IPsec ESP and AH", RFC 4543,  
             May 2006. 
    
7.2 Informative References 
    
   [RFC4302] Kent, S., "IP Authentication Header", RFC 4302,  
             December 2005.  
    
   [RFC4835] Manral, V., "Cryptographic Algorithm Implementation  
             Requirements for Encapsulating Security Payload (ESP) and     
             Authentication Header (AH)", RFC 4835, APRIL 2007. 
    
8. Author's Addresses 
    
   Manav Bhatia 
   Alcatel-Lucent, 
   Bangalore, India 
   Email: manav@alcatel-lucent.com     
    
Full Copyright Statement 
    
   Copyright (C) The IETF Trust (2008). 
    
   This document is subject to the rights, licenses and restrictions 
   contained in BCP 78, and except as set forth therein, the authors 
   retain all their rights. 
    
   This document and the information contained herein are provided on an 
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS 
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND 
   THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS 
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF 
   THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED 
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 
    
Intellectual Property 
    
   The IETF takes no position regarding the validity or scope of any 
   Intellectual Property Rights or other rights that might be claimed 
   to pertain to the implementation or use of the technology described 
   in this document or the extent to which any license under such rights 
   might or might not be available; nor does it represent that it has 
   made any independent effort to identify any such rights.  Information 
   on the procedures with respect to rights in RFC documents can be 
   found in BCP 78 and BCP 79. 
  
 
Bhatia                     Expires April 2009                  [Page 5] 
Internet Draft         Identifying ESP-NULL Packets       December 2008 
 
 
    
   Copies of IPR disclosures made to the IETF Secretariat and any   
   assurances of licenses to be made available, or the result of an   
   attempt made to obtain a general license or permission for the use   
   of such proprietary rights by implementers or users of this   
   specification can be obtained from the IETF on-line IPR repository   
   at http://www.ietf.org/ipr. 
    
   The IETF invites any interested party to bring to its attention any 
   copyrights, patents or patent applications, or other proprietary 
   rights that may cover technology that may be required to implement 
   this standard.  Please address the information to the IETF at ietf-
   ipr@ietf.org. 
    
    
    
    
































  
 
Bhatia                     Expires April 2009                  [Page 6] 


PAFTECH AB 2003-20262026-04-24 04:26:22