-- BEGIN included message
- To: "Waters, Stephen" <Stephen.Waters@cabletron.com>
- Subject: Re: Deprecation of AH header from the IPSEC tool kit
- From: Dave Perks <Dave_Perks@mitel.com>
- Date: Wed, 14 Jun 2000 10:30:22 -0400
- Organization: Mitel Corporation
- References: <29752A74B6C5D211A4920090273CA3DC01D282D3@new-exc1.ctron.com>
I only have experience with RIPV2, but have to argue with a point or two. In particular, I don't see why AH would be preferred over ESP(AH). I *do* however see why IPSEC would be preferred over RIPV2's authentication. "Waters, Stephen" wrote: > >From reading the various, associated methods of securing ISIS, OSPF and > RIPV2 messages, it seems to me that AH is perfect for the protection of > these protocols. > > The current HMAC-MD5 options have the following exposures that are solved > with AH: > > 1) no source address authentication (IP header authentication in general) IPSEC+ESP(AH) would protect the UDP header of RIPV2, so the UDP checksum would provide some limited protection of the source address. > 2) poor/no replay protection Agreed, but ESP(AH) would handle this too. > 3) manual keys - which restricts key length and complexity to > human-manageable keys, and makes for difficult key change procedures. Agreed, but ditto for ESP(AH). (On the other hand, trying to use IPSEC phase 1 and 2 before the routers can communicate could lead to a chicken-egg situation. I think that this might have been a motivation for the original built-in authentication scheme.) > IPSEC+AH would seem to be a good choice for all control traffic exchange > between routers. If this exchange is confidential, the ESP could be used as > well. RIPV2 is multicast, and AFAIK IPSEC hasn't addressed keying of multicast sessions.
-- END included message