Does anybody out there use Authentication Header (AH)?

TR Shaw tshaw at oitc.com
Sun Jan 1 19:34:28 CST 2012


John,

Unlike AH,  ESP in transport mode does not provide integrity and authentication for the entire IP packet. However,  in Tunnel Mode,  where the entire original IP packet is encapsulated with a new packet header added,  ESP protection is afforded to the whole inner IP packet (including the inner header) while the outer header (including any outer IPv4 options or IPv6 extension headers) remains unprotected.  Thus, you need AH to authenticate the integrity of the outer header packet information.

Again, just like PGPMail as I explained before,

Tom


On Jan 1, 2012, at 7:32 PM, John Smith wrote:

> Hi Tom,
> 
> Thanks for the reply.
> 
> Why cant we use ESP/NULL for meeting the NIST requirement? Is there something extra that AH offers here?
> 
> Regards, 
> John
> 
> From: TR Shaw <tshaw at oitc.com>
> To: John Smith <jsmith4112003 at yahoo.co.uk> 
> Cc: "nanog at nanog.org" <nanog at nanog.org> 
> Sent: Monday, 2 January 2012, 5:57
> Subject: Re: Does anybody out there use Authentication Header (AH)?
> 
> 
> On Jan 1, 2012, at 7:12 PM, John Smith wrote:
> 
> > Hi,
> > 
> > I am trying to see if there are people who use AH specially since RFC 4301 has a MAY for AH and a MUST for ESP-NULL. While operators may not care about a MAY or a MUST in an RFC, but the IETF protocols and vendors do. So all protocols that require IPsec for authentication implicitly have a MAY for AH and a MUST for ESP-NULL.
> > 
> > Given that there is hardly a difference between the two, I am trying to understand the scenarios where people might want to use AH? OR is it that people dont care and just use what their vendors provide them?
> > 
> > Regards,
> > John
> 
> AH provides for  connectionless integrity and data origin authentication and provides protection against replay attacks.  Many US Gov departments that have to follow NIST and do not understand what this means require it between internal point-to-point routers between one portion of their organization and another adding more expense for no increase in operational security.
> 
> If you are following NIST or DCID-63, this is required to meet certain integrity requirements
> 
> ESP provides confidentiality,  data origin authentication,  connectionless integrity,  an anti-replay service,  and limited traffic flow confidentiality.  EG AH portion provides for the integrity requirement and the ESP encryption provides for the confidentiality requirement of NIST.
> 
> Think of AH that it is like just signing a PGPMail and ESP as signing and encrypting a PGPMail.
> 
> There are reasons for both.
> 
> Tom
> 
> 
> 



More information about the NANOG mailing list