Skip to main content

Negotiation of NAT-Traversal in the IKE
draft-ietf-ipsec-nat-t-ike-08

Revision differences

Document history

Date Rev. By Action
2012-08-22
08 (System) post-migration administrative database adjustment to the No Objection position for Thomas Narten
2012-08-22
08 (System) post-migration administrative database adjustment to the No Objection position for Jon Peterson
2012-08-22
08 (System) post-migration administrative database adjustment to the No Objection position for Steven Bellovin
2004-04-29
08 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2004-04-28
08 Amy Vezza IESG state changed to Approved-announcement sent
2004-04-28
08 Amy Vezza IESG has approved the document
2004-04-28
08 Amy Vezza Closed "Approve" ballot
2004-04-27
08 (System) [Ballot Position Update] New position, No Objection, has been recorded for Alex Zinin
2004-04-27
08 Jon Peterson [Ballot Position Update] Position for Jon Peterson has been changed to No Objection from Discuss by Jon Peterson
2004-03-23
08 Russ Housley State Changes to Approved-announcement to be sent from IESG Evaluation by Russ Housley
2004-02-20
08 Russ Housley State Changes to IESG Evaluation from IESG Evaluation::Revised ID Needed by Russ Housley
2004-02-19
08 Thomas Narten [Ballot Position Update] Position for Thomas Narten has been changed to No Objection from Discuss by Thomas Narten
2004-02-18
08 Steven Bellovin [Ballot Position Update] Position for Steve Bellovin has been changed to No Objection from Discuss by Steve Bellovin
2004-02-18
08 (System) New version available: draft-ietf-ipsec-nat-t-ike-08.txt
2003-11-21
08 Amy Vezza Removed from agenda for telechat - 2003-11-20 by Amy Vezza
2003-11-20
08 Amy Vezza [Ballot Position Update] New position, No Objection, has been recorded for  by Amy Vezza
2003-11-20
08 Amy Vezza [Ballot Position Update] New position, No Objection, has been recorded for  by Amy Vezza
2003-11-20
08 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2003-11-20
08 Thomas Narten
[Ballot comment]
> Take the common case of the initiator behind the NAT. The initiator must
> quickly change to 4500 once the NAT has …
[Ballot comment]
> Take the common case of the initiator behind the NAT. The initiator must
> quickly change to 4500 once the NAT has been detected to minimize the

s/4500/port 4500/


> If there is a NAT box between normal tunnel or transport encapsulations
> may not work and in that case UDP-Encapsulation SHOULD be used.

hard to parse.
2003-11-20
08 Thomas Narten
[Ballot discuss]
> The NAT-Traversal capability of the remote host is determined by an
> exchange of vendor strings; in Phase 1 two first messages, …
[Ballot discuss]
> The NAT-Traversal capability of the remote host is determined by an
> exchange of vendor strings; in Phase 1 two first messages, the vendor id
> payload for this specification of NAT-Traversal (MD5 hash of "RFC XXXX"
> - ["XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX"]) MUST be sent if supported
> (and it MUST be received by both sides) for the NAT-Traversal probe to
> continue.

We have to do this with vendor IDs? I could understand using vendor
IDs if this was for backwards compatability, but the above indicates a
new has value gets defined (including the RFC number). Can't we do the
negotiation using more standards mechanisms?

> Once port change has occurred, if a packet is received on 500, that
> packet is old. If the packet is an informational, it MAY be processed if
> local policy allows. If the packet is a main mode or aggressive mode
> packet, it SHOULD be discarded.

Is an informational one that starts the negotiation? If so, it should
be a SHOULD/MUST, since the initiater might reboot and lose all
state. Bottom line, please assure me that if the initiator reboots, and
restarts the IKE exchange, the right thing happens (i.e, the responder
doesn't drop the packets as describe above).
2003-11-20
08 Thomas Narten [Ballot Position Update] New position, Discuss, has been recorded for  by Thomas Narten
2003-11-20
08 Bill Fenner [Ballot Position Update] New position, No Objection, has been recorded for  by Bill Fenner
2003-11-20
08 Bert Wijnen [Ballot Position Update] New position, No Objection, has been recorded for  by Bert Wijnen
2003-11-20
08 Jon Peterson
[Ballot discuss]
This document does not contain a reference to RFC3424. It should do so, and it should explicitly address the five concerns raised …
[Ballot discuss]
This document does not contain a reference to RFC3424. It should do so, and it should explicitly address the five concerns raised in RFC3424 Section 4. For a good example, see Section 14 of RFC3489. I would also recommend reading the NAT taxonomy in RFC3489 Section 5, and identifying which sorts of NATs this mechanism will accommodate, and whether or not different behavior is required for different types of NATs (there is a little of that already, but more would be nice).

This document seems to address only the case where one of the IKE endpoints is behind a NAT (and the other is apparently in public address space), since initial reachability is just assumed. Little considerations seems to be given of cases where both are behind a NAT - the most material case for common peer-to-peer applications on the net today, and the most difficult to solve. While I don't expect the authors to take on that problem, the draft should at least identify (in Section 1, I'd imagine) that this is its scope.

There's more that could be said here (along the lines of Ted's comment), but I'll leave it at that.
2003-11-20
08 Jon Peterson [Ballot Position Update] Position for Jon Peterson has been changed to Discuss from Undefined by Jon Peterson
2003-11-20
08 Jon Peterson [Ballot Position Update] New position, Undefined, has been recorded for  by Jon Peterson
2003-11-19
08 Harald Alvestrand
[Ballot comment]
Needs a little language wash. Examples:
3.2 "and the one of the other NAT-D payloads must match"
    "as defined in the …
[Ballot comment]
Needs a little language wash. Examples:
3.2 "and the one of the other NAT-D payloads must match"
    "as defined in the [Hutt03]"
7 "There are cases where NAT box decides to remove mappings"

The RFC Editor can do that, I think.
2003-11-19
08 Harald Alvestrand [Ballot comment]
Needs a language wash. Examples:
2003-11-19
08 Harald Alvestrand [Ballot Position Update] New position, No Objection, has been recorded for  by Harald Alvestrand
2003-11-19
08 Ted Hardie
[Ballot comment]
There are a lot of design assumptions about the number and type of NATs in the
path between the two ipsec speakers buried …
[Ballot comment]
There are a lot of design assumptions about the number and type of NATs in the
path between the two ipsec speakers buried in this text.  I can see the strong
desire people have to work around both the common case and more especially
the frustrating "helpful" ipsec-aware NAT.  This kind of NAT discovery is full of
pitfalls, though, and it ends up being an arms-race.  I won't stand in the
way of folks wanting to add this to their arsenal, but I fundamentally think
this is the wrong approach--and "helpfulness" is only going to kick you again
when you have this deployed.  (I already have nightmares about "helpful" NATs
pretending to be STUN servers out on the network, and this is probably going
to add a twist to those...)
2003-11-19
08 Ted Hardie [Ballot Position Update] Position for Ted Hardie has been changed to Abstain from Undefined by Ted Hardie
2003-11-19
08 Ted Hardie [Ballot Position Update] Position for Ted Hardie has been changed to Undefined from Abstain by Ted Hardie
2003-11-19
08 Ted Hardie [Ballot Position Update] New position, Abstain, has been recorded for  by Ted Hardie
2003-11-19
08 Margaret Cullen
[Ballot comment]
>> The NAT-Traversal capability of the remote host is determined by an
>> exchange of vendor strings; in Phase 1 two first messages, …
[Ballot comment]
>> The NAT-Traversal capability of the remote host is determined by an
>> exchange of vendor strings; in Phase 1 two first messages, the vendor id
>> payload for this specification of NAT-Traversal (MD5 hash of "RFC XXXX"
>> - ["XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX"]) MUST be sent if supported
>> (and it MUST be received by both sides) for the NAT-Traversal probe to
>> continue.

The above sentence doesn't make sense to me.  Perhaps:

s/strings; in Phase 1 two first messages,/strings. In the first
two Phase 1 messages,/
2003-11-19
08 Margaret Cullen [Ballot Position Update] New position, No Objection, has been recorded for  by Margaret Wasserman
2003-11-19
08 Ned Freed [Ballot comment]
Nits:

No copyright boilerplate.
Old way of doing IPR notification?
2003-11-19
08 Ned Freed [Ballot Position Update] New position, No Objection, has been recorded for  by Ned Freed
2003-11-17
08 Steven Bellovin
[Ballot discuss]
3.1: The exact string to feed to MD5 isn't clear.  Are the quote marks included?  The hyphen?  The blanks on either side of …
[Ballot discuss]
3.1: The exact string to feed to MD5 isn't clear.  Are the quote marks included?  The hyphen?  The blanks on either side of the hyphen?  The square brackets?

Why is this using a vendor ID?  Where does XXX... come from?  It's not listed in the IANA Considerations section.

(Note: this document shows a fascinating item  protocol-awareness by the NAT has actually proved harmful!)
2003-11-17
08 Steven Bellovin [Ballot Position Update] New position, Discuss, has been recorded for  by Steve Bellovin
2003-11-08
08 Russ Housley Placed on agenda for telechat - 2003-11-20 by Russ Housley
2003-11-08
08 Russ Housley State Changes to IESG Evaluation from Waiting for Writeup by Russ Housley
2003-11-08
08 Russ Housley Status date has been changed to 2003-11-08 from 2003-10-08
2003-11-08
08 Russ Housley [Ballot Position Update] New position, Yes, has been recorded for Russ Housley
2003-11-08
08 Russ Housley Ballot has been issued by Russ Housley
2003-11-08
08 Russ Housley Created "Approve" ballot
2003-11-04
08 (System) State has been changed to Waiting for Writeup from In Last Call by system
2003-10-21
08 Amy Vezza Last call sent
2003-10-21
08 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2003-10-20
08 Russ Housley Last Call was requested by Russ Housley
2003-10-20
08 Russ Housley State Changes to Last Call Requested from Last Call Requested by Russ Housley
2003-10-20
08 (System) Ballot writeup text was added
2003-10-20
08 (System) Last call text was added
2003-10-20
08 (System) Ballot approval text was added
2003-10-08
08 Russ Housley Status date has been changed to 2003-10-08 from 2003-05-30
2003-10-08
08 Russ Housley State Changes to Last Call Requested from AD Evaluation::Revised ID Needed by Russ Housley
2003-09-29
07 (System) New version available: draft-ietf-ipsec-nat-t-ike-07.txt
2003-09-12
08 Russ Housley State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Russ Housley
2003-06-06
08 Russ Housley State Changes to AD Evaluation from Publication Requested by Housley, Russ
2003-05-30
08 Russ Housley Draft Added by Housley, Russ
2003-05-29
06 (System) New version available: draft-ietf-ipsec-nat-t-ike-06.txt
2003-01-08
05 (System) New version available: draft-ietf-ipsec-nat-t-ike-05.txt
2002-11-06
04 (System) New version available: draft-ietf-ipsec-nat-t-ike-04.txt
2002-07-26
(System) Posted related IPR disclosure: Microsoft's Patent Claim pertaining to draft-ietf-ipsec-nat-t-ike and draft-ietf-ipsec-udp-encaps
2002-06-25
03 (System) New version available: draft-ietf-ipsec-nat-t-ike-03.txt
2002-04-11
02 (System) New version available: draft-ietf-ipsec-nat-t-ike-02.txt
2001-10-23
01 (System) New version available: draft-ietf-ipsec-nat-t-ike-01.txt
2001-06-21
00 (System) New version available: draft-ietf-ipsec-nat-t-ike-00.txt