[13684] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: authentication and ESP

daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Fri Jun 20 22:30:38 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
To: crypto list <cryptography@metzdowd.com>
Date: Fri, 20 Jun 2003 14:28:40 -0400
From: "Steven M. Bellovin" <smb@research.att.com>

In message <20030619174940.GA18220@diamond.madduck.net>, martin f krafft writes
:

>As far as I can tell, IPsec's ESP has the functionality of
>authentication and integrity built in:
>
>RFC 2406:
>
>   2.7 Authentication Data
>
>   The Authentication Data is a variable-length field containing an
>   Integrity Check Value (ICV) computed over the ESP packet minus
>   the Authentication Data.  The length of the field is specified by
>   the authentication function selected.  The Authentication Data
>   field is optional, and is included only if the authentication
>   service has been selected for the SA in question.  The
>   authentication algorithm specification MUST specify the length of
>   the ICV and the comparison rules and processing steps for
>   validation.
>
>To my knowledge, IPsec implementations use AH for "signing" though.
>Why do we need AH, or why is it preferred?
>
>Thanks for your clarification!


The question has been asked quite often.  The short answer is that AH 
protects parts of the preceeding IP header, which ESP doesn't do.  I 
did an analysis many years ago which showed that everything in the AH 
header was either unprotectable, irrelevant, or protected in some other 
fashion.  But the question has been re-opened, notably with regard to 
protecting Neighbor Discover in IPv6.


		--Steve Bellovin, http://www.research.att.com/~smb (me)
		http://www.wilyhacker.com (2nd edition of "Firewalls" book)



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post