Internet Draft Identifying ESP-NULL Packets December 2008 Network Working Group Manav Bhatia Internet Draft Alcatel-Lucent Intended Status: Proposed Standard Expires: May 2009 Identifying ESP-NULL Packets draft-bhatia-ipsecme-esp-null-00.txt Status of this Memo By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire on May 2009. Abstract Encapsulating Security Payload (ESP) [RFC4303] provides data integrity protection, confidentiality and data origin authentication for data transported in an IP packet. There are various applications and protocols that do not require confidentiality but only need data integrity assurance or data origin authentication. Since ESP support is mandatory for IPSec, such applications end up using ESP with NULL encryption. However, because of the way ESP is defined, it is impossible for firewalls and intermediate routers to differentiate between encrypted ESP and ESP NULL packets by simply examining them. This poses Bhatia Expires April 2009 [Page 1]
Internet Draft Identifying ESP-NULL Packets December 2008 problems for the firewalls since such packets cannot be filtered and identified. It poses a different set of problems for routers since such packets cannot be properly filtered, classified and prioritized. This document proposes an extension to ESP so that firewalls and routers can disambiguate between ESP encrypted and ESP NULL encrypted packets. Conventions used in this document The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119]. 1. Introduction ESP-NULL is used when confidentiality is not required and only source authentication and data integrity assurance is desired. IPSec mandates the use of ESP while keeps support for Authentication Header (AH) [RFC4302] as optional. Thus, new protocols using IPSec for data integrity also mandate the use of ESP-NULL. It is also mandatory [RFC4835] for all ESP implementations to provide support for ESP NULL encryption. Because of these factors a lot of vendors do not implement AH and only support ESP-NULL for data integrity and source authentication. The traffic using ESP-NULL is thus only going to increase with time. Firewalls and intermediate routers in the network find it impossible to parse ESP packets since they have no idea whether the packet is encrypted or not. They cannot for this reason implement filters and access control lists (ACLs). ACLs are highly desirable and used extensively by service providers to block undesired traffic coming from other domains. This draft therefore proposes an extension to ESP with which identifying an ESP-NULL packet from an ESP encrypted packet becomes trivial. It is backward compatible, therefore devices that do not understand this extension would treat packets using this extension as normal ESP packets. The extension described in this draft is applicable for both the tunnel and the transport modes of ESP. 2. Explicitly Marking ESP NULL Packets ESP-NULL packets, for both implementations based on [RFC2410] and [RFC4543] MUST be sent with a well known, reserved SPI of 1. The Bhatia Expires April 2009 [Page 2]
Internet Draft Identifying ESP-NULL Packets December 2008 original SPI should be included as part of the payload. This is encoded in the first 4 octets of the payload section of the ESP header. An implementation MUST put the next-header and the ESP header th th length as the 4 and the 5 octets of the payload. Since the packet is not encrypted these fields would be sent in clear text and would be visible to all. An extended ESP packet using NULL encryption would thus look like this: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Reserved Security Parameters Index (RSPI) = 1 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Sequence Number | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Original Security Parameters Index (SPI) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | next-header | eESP HDRLen | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Payload Data* (variable) | ~ ~ | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Padding (0-255 bytes) | +-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Pad Length | Next Header | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Authentication Data (variable) | ~ ~ | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 1 Reserved Security Parameters Index (RSPI): Well known value that should be given by IANA to indicate that it is an ESP-NULL packet. next-header: This is a one octet field that indicates the next protocol header. Explicitly mentioning this provides an easy access to a HW parser to extract the upper layer protocol. eESP HDRLen: This is a one octet field that gives the length of the extended ESP header + IV (if mandated by the authentication algorithm). It is an offset to the beginning of the payload data. Bhatia Expires April 2009 [Page 3]
Internet Draft Identifying ESP-NULL Packets December 2008 Intermediate nodes (routers, firewalls, etc) interested in inspecting the packets en route can look at the SPI value at the start of the ESP header. If there are unaware of this extension then this packet would appear like a normal ESP packet. However, compliant implementations will understand that this is an extended ESP packet and would have enough information to be able to deep inspect the ESP- NULL packet. The compliant end nodes (routers) can similarly parse the packet easily. If the SPI value is 1, then it can extract the original SPI from the payload and process the packet accordingly. 3. Authenticating the Packets All fields of the extended ESP header starting with the RSPI and ending with the Next Header in the ESP trailer are included in the ESP data integrity check. The authentication data field is used to hold the result of the data integrity check done on the ESP packet. The length of this field depends on the authentication algorithm employed by the Security Association (SA) used to process this packet. 4. Acknowledgements The author would like to thank Jack Kohn for his useful comments. 5. IANA Considerations IANA must assign a value that for Reserved SPI which will be used as described above. The draft uses a value 1 to foster pre-standard implementations. 6. Security Considerations This proposal neither increases nor decreases the security for ESP. All considerations valid for ESP also apply here. 7. References 7.1 Normative References [RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)", RFC 4303, December 2005. [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", RFC 2119, BCP 14, February 2001.
Bhatia Expires April 2009 [Page 4]
Internet Draft Identifying ESP-NULL Packets December 2008 [RFC2410] Glenn, R., and Kent, S., "The NULL Encryption Algorithm and its Use With IPsec", RFC 2410, November 1998. [RFC4543] McGrew, D. and Viega, J., "The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH", RFC 4543, May 2006. 7.2 Informative References [RFC4302] Kent, S., "IP Authentication Header", RFC 4302, December 2005. [RFC4835] Manral, V., "Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH)", RFC 4835, APRIL 2007. 8. Author's Addresses Manav Bhatia Alcatel-Lucent, Bangalore, India Email: email@example.com Full Copyright Statement Copyright (C) The IETF Trust (2008). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Intellectual Property The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Bhatia Expires April 2009 [Page 5]
Internet Draft Identifying ESP-NULL Packets December 2008 Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf- firstname.lastname@example.org. Bhatia Expires April 2009 [Page 6]