[Docs] [txt|pdf] [Tracker] [Email] [Nits]
Versions: 00
Internet Draft Identifying ESP-NULL Packets December 2008
Network Working Group Manav Bhatia
Internet Draft Alcatel-Lucent
Intended Status: Proposed Standard
Expires: May 2009
Identifying ESP-NULL Packets
draft-bhatia-ipsecme-esp-null-00.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on May 2009.
Abstract
Encapsulating Security Payload (ESP) [RFC4303] provides data
integrity protection, confidentiality and data origin authentication
for data transported in an IP packet.
There are various applications and protocols that do not require
confidentiality but only need data integrity assurance or data origin
authentication. Since ESP support is mandatory for IPSec, such
applications end up using ESP with NULL encryption.
However, because of the way ESP is defined, it is impossible for
firewalls and intermediate routers to differentiate between encrypted
ESP and ESP NULL packets by simply examining them. This poses
Bhatia Expires April 2009 [Page 1]
Internet Draft Identifying ESP-NULL Packets December 2008
problems for the firewalls since such packets cannot be filtered and
identified. It poses a different set of problems for routers since
such packets cannot be properly filtered, classified and prioritized.
This document proposes an extension to ESP so that firewalls and
routers can disambiguate between ESP encrypted and ESP NULL encrypted
packets.
Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
1. Introduction
ESP-NULL is used when confidentiality is not required and only source
authentication and data integrity assurance is desired.
IPSec mandates the use of ESP while keeps support for Authentication
Header (AH) [RFC4302] as optional. Thus, new protocols using IPSec
for data integrity also mandate the use of ESP-NULL. It is also
mandatory [RFC4835] for all ESP implementations to provide support
for ESP NULL encryption. Because of these factors a lot of vendors do
not implement AH and only support ESP-NULL for data integrity and
source authentication. The traffic using ESP-NULL is thus only going
to increase with time.
Firewalls and intermediate routers in the network find it impossible
to parse ESP packets since they have no idea whether the packet is
encrypted or not. They cannot for this reason implement filters and
access control lists (ACLs).
ACLs are highly desirable and used extensively by service providers
to block undesired traffic coming from other domains.
This draft therefore proposes an extension to ESP with which
identifying an ESP-NULL packet from an ESP encrypted packet becomes
trivial. It is backward compatible, therefore devices that do not
understand this extension would treat packets using this extension as
normal ESP packets.
The extension described in this draft is applicable for both the
tunnel and the transport modes of ESP.
2. Explicitly Marking ESP NULL Packets
ESP-NULL packets, for both implementations based on [RFC2410] and
[RFC4543] MUST be sent with a well known, reserved SPI of 1. The
Bhatia Expires April 2009 [Page 2]
Internet Draft Identifying ESP-NULL Packets December 2008
original SPI should be included as part of the payload. This is
encoded in the first 4 octets of the payload section of the ESP
header. An implementation MUST put the next-header and the ESP header
th th
length as the 4 and the 5 octets of the payload.
Since the packet is not encrypted these fields would be sent in clear
text and would be visible to all.
An extended ESP packet using NULL encryption would thus look like
this:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Reserved Security Parameters Index (RSPI) = 1 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Original Security Parameters Index (SPI) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| next-header | eESP HDRLen | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
| Payload Data* (variable) |
~ ~
| |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | Padding (0-255 bytes) |
+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | Pad Length | Next Header |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Authentication Data (variable) |
~ ~
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 1
Reserved Security Parameters Index (RSPI): Well known value that
should be given by IANA to indicate that it is an ESP-NULL packet.
next-header: This is a one octet field that indicates the next
protocol header. Explicitly mentioning this provides an easy access
to a HW parser to extract the upper layer protocol.
eESP HDRLen: This is a one octet field that gives the length of the
extended ESP header + IV (if mandated by the authentication
algorithm). It is an offset to the beginning of the payload data.
Bhatia Expires April 2009 [Page 3]
Internet Draft Identifying ESP-NULL Packets December 2008
Intermediate nodes (routers, firewalls, etc) interested in inspecting
the packets en route can look at the SPI value at the start of the
ESP header. If there are unaware of this extension then this packet
would appear like a normal ESP packet. However, compliant
implementations will understand that this is an extended ESP packet
and would have enough information to be able to deep inspect the ESP-
NULL packet.
The compliant end nodes (routers) can similarly parse the packet
easily. If the SPI value is 1, then it can extract the original SPI
from the payload and process the packet accordingly.
3. Authenticating the Packets
All fields of the extended ESP header starting with the RSPI and
ending with the Next Header in the ESP trailer are included in the
ESP data integrity check.
The authentication data field is used to hold the result of the data
integrity check done on the ESP packet. The length of this field
depends on the authentication algorithm employed by the Security
Association (SA) used to process this packet.
4. Acknowledgements
The author would like to thank Jack Kohn for his useful comments.
5. IANA Considerations
IANA must assign a value that for Reserved SPI which will be used as
described above. The draft uses a value 1 to foster pre-standard
implementations.
6. Security Considerations
This proposal neither increases nor decreases the security for ESP.
All considerations valid for ESP also apply here.
7. References
7.1 Normative References
[RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)",
RFC 4303, December 2005.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", RFC 2119, BCP 14, February 2001.
Bhatia Expires April 2009 [Page 4]
Internet Draft Identifying ESP-NULL Packets December 2008
[RFC2410] Glenn, R., and Kent, S., "The NULL Encryption Algorithm and
its Use With IPsec", RFC 2410, November 1998.
[RFC4543] McGrew, D. and Viega, J., "The Use of Galois Message
Authentication Code (GMAC) in IPsec ESP and AH", RFC 4543,
May 2006.
7.2 Informative References
[RFC4302] Kent, S., "IP Authentication Header", RFC 4302,
December 2005.
[RFC4835] Manral, V., "Cryptographic Algorithm Implementation
Requirements for Encapsulating Security Payload (ESP) and
Authentication Header (AH)", RFC 4835, APRIL 2007.
8. Author's Addresses
Manav Bhatia
Alcatel-Lucent,
Bangalore, India
Email: manav@alcatel-lucent.com
Full Copyright Statement
Copyright (C) The IETF Trust (2008).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed
to pertain to the implementation or use of the technology described
in this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Bhatia Expires April 2009 [Page 5]
Internet Draft Identifying ESP-NULL Packets December 2008
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use
of such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository
at http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at ietf-
ipr@ietf.org.
Bhatia Expires April 2009 [Page 6]
Html markup produced by rfcmarkup 1.129d, available from
https://tools.ietf.org/tools/rfcmarkup/