RFC 5840
Wrapped Encapsulating Security Payload (ESP) for Traffic Visibility, April 2010
- File formats:
- Status:
- PROPOSED STANDARD
- Authors:
- K. Grewal
G. Montenegro
M. Bhatia - Stream:
- IETF
- Source:
- ipsecme (sec)
Cite this RFC: TXT | XML | BibTeX
DOI: https://doi.org/10.17487/RFC5840
Discuss this RFC: Send questions or comments to the mailing list ipsec@ietf.org
Other actions: Submit Errata | Find IPR Disclosures from the IETF | View History of RFC 5840
Abstract
This document describes the Wrapped Encapsulating Security Payload (WESP) protocol, which builds on the Encapsulating Security Payload (ESP) RFC 4303 and is designed to allow intermediate devices to (1) ascertain if data confidentiality is being employed within ESP, and if not, (2) inspect the IPsec packets for network monitoring and access control functions. Currently, in the IPsec ESP standard, there is no deterministic way to differentiate between encrypted and unencrypted payloads by simply examining a packet. This poses certain challenges to the intermediate devices that need to deep inspect the packet before making a decision on what should be done with that packet (Inspect and/or Allow/Drop). The mechanism described in this document can be used to easily disambiguate integrity-only ESP from ESP-encrypted packets, without compromising on the security provided by ESP. [STANDARDS-TRACK]
For the definition of Status, see RFC 2026.
For the definition of Stream, see RFC 8729.