Skip to content

Conversation

@tobiasbrunner
Copy link
Collaborator

This tries to clarify that negotiating 64-bit SN enables replay protection (i.e. the peers MUST use it). And it adds a new notify to announce the maximum accepted Crypt Offset.

of sending the value 0, the notification SHOULD be omitted entirely.
That is, if this notification was not received by a peer, that peer
MUST not use a Crypt Offset when sending EESP packets.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hmm, what to do with packets violating this "MUST"? Or violating the maximum Crypt Offset value? Perhaps this should be specified in the core EESP document, but some rules should be given.
This is actually a difficult question. On one hand, if the peer sends a packet with Crypt Offset greater maximum announced value (including 0), then the possible harm (if any) has already done, so why the packet should be dropped? On the other hand, this is a violation of a host's policy, so why we expressed it if we do not enforce it?
Opinions?

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah, I first had "MUST drop the packet" in the second paragraph of this section (where I now just recommend terminating the IKE SA). But like you, I wondered why, because it's a valid packet and the damage is already done so why drop it.

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

After discussing it with Antony and Steffen, I've added that the packet MUST be dropped and only the Child SA SHOULD be deleted. I've added the same text here at the bottom of the section.

@antonyantony antonyantony merged commit d47c9c8 into main Aug 22, 2025
1 check failed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants