Re: [auth48] [C381] Re: AUTH48: RFC-to-be 9303 <draft-ietf-lisp-sec-29> for your review

"Fabio Maino (fmaino)" <fmaino@cisco.com> Wed, 21 September 2022 00:47 UTC

Return-Path: <fmaino@cisco.com>
X-Original-To: auth48archive@ietfa.amsl.com
Delivered-To: auth48archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C78BBC14CE38; Tue, 20 Sep 2022 17:47:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.607
X-Spam-Level:
X-Spam-Status: No, score=-9.607 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=GsUKOCaH; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=tY0Lj2X4
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CfoqkMZabVSr; Tue, 20 Sep 2022 17:47:20 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 59A85C14CF1E; Tue, 20 Sep 2022 17:47:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=16024; q=dns/txt; s=iport; t=1663721240; x=1664930840; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=yi0hLgeUWkoXM/KU9jUfHVWWKPRqWog+QrJR0vb5w7w=; b=GsUKOCaHfammP/2pYiBHMSYUc7e0MnBAmBdV95+OwyOJOhGV5GrQ96Wd tgH15wodkAWHB0NNakpDkfmqokEgubgg6V0m2qogF/KtObwtZZrojEd3f vthDjjc7W62x9fADe2CaYjGwgVfvU44VR5l8avxigXx0L0lXDNCd+C7Eu Q=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:ezPQZxYsFjFCEfs6ab9hNjn/LTAphN3EVzX9orIriLNLJ6Kk+Zmqf EnS/u5kg1KBW4LHo+lFhOzbv+GFOyQA7J+NvWpEfMlKUBkI2skTlhYrVciCD0CzJfX2bis8S cJFUlIt/3yyPUVPXsjkYFiHqXyp5jlUERL6ZmJI
IronPort-Data: A9a23:gSmWW68onPkoOTIQ3WBEDrUDEH6TJUtcMsCJ2f8bNWPcYEJGY0x3m jRKDGuFbv6Ja2T3ctAibtjl9ElQvsXXx4A3TgE4pS9EQiMRo6IpJzg2wmQcns+2BpeeJK6yx 5xGMrEsFOhtEjmE4E3F3oHJ9RGQ74nQLlbHILOCa3sZqTNMEn9700oywbdh2+aEvPDga++zk YKqyyHgEAfNNw5cagr4PIra9XuDFNyr0N8plgRWicJj5TcypFFJZH4rHpxdGlOjKmVi8kFWc M6YpF2x1juxEx7AkbpJmJ6jGqEBaua60QRjFhO6VoD66iWuqBDe3Y4HZb09Um5+jg+xvMFhj 9FG6YKyGDcQa/ikdOQ1C3G0Egl3OalAvbTAO3X66JbVxEzdeHyqyPJrZK00FdRHoaAsXycXr rpBc2xlghOr34paxJq1T+BtgMMLJ8jwN4RZsXZlpd3cJad/Hc+bE/mSu7e02h8yuvpXF6n9e /MQUn0zfBDvYz9AIw0IXcdWcOCA3ymjLGIwREiujaMq/2iPnAVr27jsLtf9YNKBAMhZn1qfv CTB5WuRKh4VJPSQyDWE4jSqi/OntSf6Q5pXH72x9+RxqFye2mJVDwcZPXO/oOKhz0eyQPpeJ lAavC00osAa+EWuT9T7GQaxvXWJrDYdXcBRGqs08mmlw6Hd6QudAm8sRzUHdcQt8sI6WFQC2 0WMltzgAxRgtbSUTTSW8bL8hSm8Mm0YIW4eYjUsVwUOptTvoZ00lFTIVNkLLUKuptTxHTe1y DeQoW1n3fMYjNUA0OOw+lWvby+QSobhcl9yxz7+d2ef1iBodMmhbNC26wnr1KMVRGqGdWWps H8BksmYyekBC5CRiSCAKNnh+pn0uJ5p1xWB3DZS84kdGyeFoCX6JN8OiN1qDAI4bJhbKGaBj Fr741s52XNFAJe9gUabiaqYD8Any8AM/vy6C6iNNbKijnWNHTJrEQlnYUqWmmvqikVpyPt5M paAesHqBnEfYUiG8NZUb7pNuVPI7nlhrY82eXwd50/8uVZ5TCXNIYrpyHPUMogEAFqs+W05C ep3OcqQ0Al4W+bjeCTR+oN7BQlUcyNlVMCo8ZwMLbPrzu9a9IcJVq65LVQJJtwNokipvrugE oyVAxUBkwOv2RUr1y3TMykyAF8QYXqPhStrYXNzVbpZ83Mieo2opLwObIc6eKJPyQCQ5aAcc hXxQO3ZWq4nYm2eo1w1NMChxKQ8L07DrVzVYEKYjM0XIsQIq/rhoIG0J2MCNUAmU0KKiCfJi +bxiV2DG8peG18K4QS/QKvH8m5ddEM1wIpaN3Yk6PEJEKkw2OCG8xDMs8I=
IronPort-HdrOrdr: A9a23:emNehqpwP6aiCOP0HiIj0AsaV5uJL9V00zEX/kB9WHVpm5Oj+f xGzc516farslossSkb6Ky90KnpewK5yXbsibNhcotKLzOWx1dAS7sSo7cKogeQVxEWk9Q96U 4OSdkHNDSdNykZsS++2njELz9C+qjHzEnLv5ak854Fd2gDAMsMj3YbNu/YKDwNeOAsP+tfKH Po3Ls/m9PWQwVwUi3UPAhhY8Hz4/nw0L72ax8PABAqrCOUiymz1bL8Gx+Emj8DTjJm294ZgC j4uj28wp/mn+Cwyxfa2WOWxY9RgsHdxtxKA9HJotQJKw/rlh2jaO1aKv6/VXEO0aOSAWQR4Z 3xSiQbToNOArTqDyeISC7WqkzdOfAVmibfIBGj8CPeSIfCNUwH4oJ69PNkm13imhEdVBUW6t MX44pf3KAnVy8o1R6NlOQhHXtR5zqJiGtnnugJg3NFV4wCLLdXsIwE5UtQVIwNBSTg9ekcYa JT5eznlb9rmGmhHjjkl3gqxMbpUmU4Hx+ATERHssuJ0yJOlHQ8y0cD3sQQknoJ6Zp4EvB/lq n5G7UtkKsLQt4dbKp7CutEScyrCnbVSRaJNG6JO1zoGKwOJnqIoZ/q57c+4v2sZfUzvdEPsY WEVEkduX85ekroB8HL1JpX8grVSGH4RjjpwtE23ekOhlQ9fsudDcSuciFbryL7mYRsPiTyYY fHBK5r
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.93,332,1654560000"; d="scan'208";a="914708406"
Received: from alln-core-12.cisco.com ([173.36.13.134]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 21 Sep 2022 00:47:19 +0000
Received: from mail.cisco.com (xfe-rcd-003.cisco.com [173.37.227.251]) by alln-core-12.cisco.com (8.15.2/8.15.2) with ESMTPS id 28L0lI7h005226 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Wed, 21 Sep 2022 00:47:18 GMT
Received: from xfe-rcd-003.cisco.com (173.37.227.251) by xfe-rcd-003.cisco.com (173.37.227.251) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9; Tue, 20 Sep 2022 19:47:18 -0500
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (72.163.14.9) by xfe-rcd-003.cisco.com (173.37.227.251) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9 via Frontend Transport; Tue, 20 Sep 2022 19:47:18 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=RHVdYt0dPJvla6Vzo6rhjHoroUX0jUUcP9DYJurLIavtWHpwKqGhNUnn7AsU5CaNxaui4PCugST7ByxDNmNhDl38fSP/l+8eTU+9yvZ+9BYd6fhW4BS6UzhvWjkYgjaa5MZu7YBLs486WpRcXIvPm4LMG+sgrPJTs8RUtmyiJoSe6BpOkP9emr6NQjBN+bQrkOett3EIHuOkJIe8ye++TS7532Yl8QchMNZvvaO8VoV79+nNqv08N5LMMGOm7LPHJZBluItOT/B2EFeM/g60C454Xm4tqGGZbpQPUZvvV1hKAhJUQm9Xo3jhvaTO+heVDp9qFDKfXTk72/XCcxno1A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=yi0hLgeUWkoXM/KU9jUfHVWWKPRqWog+QrJR0vb5w7w=; b=SOHSyEBfWW/A5kApWReEeFe6ddbohW7xkl+q6FJgA5IY/BJ+vEq7411aoGTCPgTezsIKvUDg9+Uh27TOyGARSwvqOcvIWIpFR9UyRwb1eO+LxP5r2qozpEgGBY/YpBkgGkm+/z68ZoNT+PtliuMjEdnlBE7dIXscwzAFQolh2qcxMrgtd2WJIgej6EAPaan/xCRCc5+YoBrp30GpkRx05jwxy+ANX2nG7zQGi+dCYCpdyTDD+NTPOggg3DE1H4harex/T6u/B2z2PBrz8clfpaegstbnSrAcxYUFpylHRqQZBQ6iBP6de7UxbdQtYF2DZIBwWRhSizHOWwOVlfFdWA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=yi0hLgeUWkoXM/KU9jUfHVWWKPRqWog+QrJR0vb5w7w=; b=tY0Lj2X4bk6dDQN5EsBk1S/+lwScf66nkzaLzXBrALjzg5pUetRO84XtwMLRVegzmnbRnw/cCoXmigtICLj6inPWlQr7s3o6IPr7hUQoUXTG/4FNRo9kJ27xMLbHvUCZO8VRWpKP4mCKXQycT7j3svlGi/xZfBs6x+vQ3aDVToQ=
Received: from BY5PR11MB4369.namprd11.prod.outlook.com (2603:10b6:a03:1cb::25) by SJ0PR11MB5022.namprd11.prod.outlook.com (2603:10b6:a03:2d7::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5632.19; Wed, 21 Sep 2022 00:47:16 +0000
Received: from BY5PR11MB4369.namprd11.prod.outlook.com ([fe80::b616:ea60:5072:601a]) by BY5PR11MB4369.namprd11.prod.outlook.com ([fe80::b616:ea60:5072:601a%3]) with mapi id 15.20.5654.014; Wed, 21 Sep 2022 00:47:16 +0000
From: "Fabio Maino (fmaino)" <fmaino@cisco.com>
To: "rfc-editor@rfc-editor.org" <rfc-editor@rfc-editor.org>, "ermagan@gmail.com" <ermagan@gmail.com>, "acabello@ac.upc.edu" <acabello@ac.upc.edu>, "damien.saucez@inria.fr" <damien.saucez@inria.fr>
CC: "lisp-ads@ietf.org" <lisp-ads@ietf.org>, "lisp-chairs@ietf.org" <lisp-chairs@ietf.org>, "ggx@gigix.net" <ggx@gigix.net>, "auth48archive@rfc-editor.org" <auth48archive@rfc-editor.org>
Thread-Topic: [C381] Re: AUTH48: RFC-to-be 9303 <draft-ietf-lisp-sec-29> for your review
Thread-Index: AQHYyh/3TSl4UMpC2UWCRE65Yq0qy63oncsA
Date: Wed, 21 Sep 2022 00:47:16 +0000
Message-ID: <1274860A-06FD-4BA9-9422-D5052BD56ABE@cisco.com>
References: <20220916225854.DF796AB21D@rfcpa.amsl.com>
In-Reply-To: <20220916225854.DF796AB21D@rfcpa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.65.22091101
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BY5PR11MB4369:EE_|SJ0PR11MB5022:EE_
x-ms-office365-filtering-correlation-id: c0c078b1-a701-437d-2eb3-08da9b6ad500
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: OK6zpBN1RTKG0xR96elOWHHXnsk+GVDpk7eeRQtRaH8V1obfwJqZOL3dVAgoCHWBsGD8e/ClTf0kBdaa3pXb2Z5fdom15wfmWjxRmKus/zPQKmNnl1r5DGVGfVkCYlUoe13xruAfqINF134CqnINT4BFS+Uiza8vjYDLMEXF6lA53lOC+88dUsoqnHdVED2X1W0v36TzZl0kJ7vr3QDbyrCs0LSTyaqEHtOtZ1R/WQPAUNomEqQ29Cx4R7MaEFI9BnpZJH1Mn33Um8a/JQI3fgV4dpX6ka9fhPUhRxAlXD6BWZH8zbQ3WXw/fdkrD4MuXkj19yu3pjwya0llFjvCHIDGDGrgQsaqBmFu0XEtAp+8CLJzONRtnl+peupXv9YkRvJaDSmlUP53RuLqGdS3GQTveF5bNpWoTAfPHHIvrVMzvIroCe5X7vGd2J2Tx/z6Q4gLKjPDBlWuFxiqZMtBIY88IbkO9spdM2ILadoFUbgMQqovM1+DVvDoVojc+U9eXS2Ko03GxJjSb+4Q1vp5EX/0P1uDe53GWVT7FoZNRz5kObP4FIK5az2gbiUqSZIaaagDebL4lx1PlGudbD+jNU7A0tlUcvuysHiS2qbIs+LhHN/Vs9HLL+kmxoekuSUx1LpZpFbAqSMVrUOwt4tAN/fylbx6H33HZvP1WvnETxUSY9PqmRAcElqsdbGUbjPke8qwJeagBkXOIM2o17KJ2XHLzHeYviNv67Ug1o06m/P33nICrLhAfIrQy3VtiQ0USvw3xr0uOmkwehHLiRrIfzh1to4yV1h87D5yTqd3qF9aK/Gxc8NEIbcuZvxyh2wWTNGM+lCTesPooK/spnnAh8Kqzn/lVB9pG4rQJtTJaYePmnyoWIjaiajg4aC2RLVXeBDR5m+7L7TbHpzplKBLlw==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR11MB4369.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(346002)(396003)(366004)(376002)(39860400002)(136003)(451199015)(5660300002)(83380400001)(122000001)(71200400001)(110136005)(6512007)(54906003)(6486002)(478600001)(2906002)(26005)(316002)(33656002)(38070700005)(38100700002)(66556008)(2616005)(186003)(8936002)(86362001)(41300700001)(36756003)(66476007)(66446008)(76116006)(53546011)(966005)(8676002)(4326008)(66946007)(64756008)(6506007)(45980500001)(19607625013); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <A9965F96FBDFB64A8981B2CBA0C2FA9E@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY5PR11MB4369.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c0c078b1-a701-437d-2eb3-08da9b6ad500
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Sep 2022 00:47:16.8119 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: IxGprA6jX/d6yrLttnss+jQs7bdNM4r4P3IwIlJiUWOAAE2x9/h3y/NR4eUid38VK+3PEM6Byr+Lzs/VxhQ7Kw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR11MB5022
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.227.251, xfe-rcd-003.cisco.com
X-Outbound-Node: alln-core-12.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/auth48archive/ORII0IQYMswmjIgHs-ew6LRuqkA>
Subject: Re: [auth48] [C381] Re: AUTH48: RFC-to-be 9303 <draft-ietf-lisp-sec-29> for your review
X-BeenThere: auth48archive@rfc-editor.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Archiving AUTH48 exchanges between the RFC Production Center, the authors, and other related parties" <auth48archive.rfc-editor.org>
List-Unsubscribe: <https://mailman.rfc-editor.org/mailman/options/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/auth48archive/>
List-Post: <mailto:auth48archive@rfc-editor.org>
List-Help: <mailto:auth48archive-request@rfc-editor.org?subject=help>
List-Subscribe: <https://mailman.rfc-editor.org/mailman/listinfo/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Sep 2022 00:47:25 -0000

Please see in-line...

On 9/16/22, 3:59 PM, "rfc-editor@rfc-editor.org" <rfc-editor@rfc-editor.org> wrote:

    Authors,

    While reviewing this document during AUTH48, please resolve (as necessary) 
    the following questions, which are also in the XML file.

    1) <!--[rfced] It appears that text may be missing in this sentence
    after "defined in".  Should this refer to RFC 7835?  Please review and 
    let us know how to update.

    Original:
       LISP-SEC builds on top of the security mechanisms defined in to
       address the threats described in Section 4 by leveraging the trust
       relationships existing among the LISP entities
       ([I-D.ietf-lisp-rfc6833bis]) participating in the exchange of the
       Map-Request/Map-Reply messages.
    -->   

Section 5 

OLD: 
LISP-SEC builds on top of the security mechanisms defined in

NEW:
LISP-SEC builds on top of the security mechanisms defined in [I-D.ietf-lisp-rfc6833bis]


    2) <!-- [rfced] HMAC is expanded in this document as "Keyed-Hashing for Message 
    Authentication (HMAC)".  While the title of RFC 2104 matches this expansion, 
    we have changed it to "Hashed Message Authentication Code (HMAC)" as that is 
    more common.  Please let us know if you strongly prefer that this be reverted.

       o  The Map-Server uses the ITR-OTK to compute a Keyed-Hashing for
          Message Authentication (HMAC) [RFC2104] that protects the
          integrity of the mapping data known to the Map-Server to prevent
          overclaiming attacks.
    -->

Ok


    3) <!-- [rfced] Should instances of "ECM message" be updated to read simply
    "ECM" to avoid redundancy (if expanded, "ECM message" would read
    "Encapsulated Control Message message"). Please review and let us know
    if we may update the text. 

    Example from Section 5 (original):
       2.  The Map-Resolver decapsulates the ECM message, decrypts the ITR-
           OTK, if needed, and forwards through the Mapping System the
           received Map-Request and the ITR-OTK, as part of a new ECM
           message.
    -->   

Ok.

Global

OLD:
ECM message

NEW: 
ECM


    4) <!-- [rfced] We note that RFC 3394 does not include any mention of
    "msg-key" or "per-msg-key". Please review and let us know how to update the
    citation.    

    Original:
       According to [RFC3394] the per-msg-key is used to wrap the OTK
       with AES-KEY-WRAP-128.
    -->   

The per-msg-key is defined in this doc, and wrapped using the OTK defined in this doc using AES-KEY-WRAP-128 that is specified in RFC3394. The following should be more clear:

Section 6.5

OLD:
According to [RFC3394] the per-msg-key is used to wrap the OTK with AES-KEY-WRAP-128.

NEW:
The per-msg-key is then used to wrap the OTK with AES-KEY-WRAP-128, as specified in section 2.2.1 of {RFC3394]


    5) <!-- [rfced] Should "128 less significant bits" be "128 least significant 
    bits"?  Please review.

    Original:
           The most significant
           64-bit are copied in the One-Time Key Preamble field, while the
           128 less significant bits are copied in the One-Time Key field of
           the LISP-SEC Authentication Data.

    Perhaps:
           The most significant 64 bits
           are copied in the 'One-Time Key Preamble' field, while the 128
           least significant bits are copied in the 'One-Time Key' field of
           the LISP-SEC Authentication Data.
    -->

Ok

    6) <!--[rfced] It is unclear if "will be discarded" is referring to
    "a replayed Map-Reply" or "the incoming Map-Reply". Please review
    and let us know how this sentence should be updated.

    Original:
       If a replayed Map-Reply arrives at the ITR, there is no <nonce,ITR-OTK>
       that matches the incoming Map-Reply and will be discarded.

    Perhaps (referring "a replayed Map-Reply": 
       If a replayed Map-Reply arrives at the ITR, there is no <nonce,ITR-OTK>
       that matches the incoming Map-Reply and the replayed Map-Reply will be
       discarded.
    -->

Ok

    7) <!--[rfced] Throughout the text, the following term appears to be used 
    inconsistently: 

    key wrap vs. Key Wrap vs. key wrapping

    Please review these occurrences and let us know
    if/how this may be made consistent.
    -->

Please, change ONLY the following instances: 

Section 6.5
OLD: 
as well as the AES-KEY-WRAP-128 Key Wrap algorithm
NEW: 
as well as the AES-KEY-WRAP-128 key wrap algorithm

OLD: 
1.  The KDF and Key Wrap algorithms
NEW: 
1.  The KDF and key wrap algorithms

OLD: 
The output of the AES Key Wrap operation is 192-bit long.
NEW:
The output of the AES key wrap operation is 192-bit long.

OLD: 
AES Key Wrap decryption operation
NEW: 
AES key wrap decryption operation


    8) <!-- [rfced] Please review the "Inclusive Language" portion of the online 
    Style Guide <https://www.rfc-editor.org/styleguide/part2/#inclusive_language> 
    and let us know if any changes are needed. Note that our script did not flag
    any words in particular, but this should still be reviewed as a best practice.
    -->  

I don’t see any occurrence of non-inclusive language. 



Thanks for another great review! 
Fabio



    Thank you.

    RFC Editor


    On Sep 16, 2022, at 3:56 PM, rfc-editor@rfc-editor.org wrote:

    *****IMPORTANT*****

    Updated 2022/09/16

    RFC Author(s):
    --------------

    Instructions for Completing AUTH48

    Your document has now entered AUTH48.  Once it has been reviewed and 
    approved by you and all coauthors, it will be published as an RFC.  
    If an author is no longer available, there are several remedies 
    available as listed in the FAQ (https://www.rfc-editor.org/faq/).

    You and you coauthors are responsible for engaging other parties 
    (e.g., Contributors or Working Group) as necessary before providing 
    your approval.

    Planning your review 
    ---------------------

    Please review the following aspects of your document:

    *  RFC Editor questions

       Please review and resolve any questions raised by the RFC Editor 
       that have been included in the XML file as comments marked as 
       follows:

       <!-- [rfced] ... -->

       These questions will also be sent in a subsequent email.

    *  Changes submitted by coauthors 

       Please ensure that you review any changes submitted by your 
       coauthors.  We assume that if you do not speak up that you 
       agree to changes submitted by your coauthors.

    *  Content 

       Please review the full content of the document, as this cannot 
       change once the RFC is published.  Please pay particular attention to:
       - IANA considerations updates (if applicable)
       - contact information
       - references

    *  Copyright notices and legends

       Please review the copyright notice and legends as defined in
       RFC 5378 and the Trust Legal Provisions 
       (TLP – https://trustee.ietf.org/license-info/).

    *  Semantic markup

       Please review the markup in the XML file to ensure that elements of  
       content are correctly tagged.  For example, ensure that <sourcecode> 
       and <artwork> are set correctly.  See details at 
       <https://authors.ietf.org/rfcxml-vocabulary>.

    *  Formatted output

       Please review the PDF, HTML, and TXT files to ensure that the 
       formatted output, as generated from the markup in the XML file, is 
       reasonable.  Please note that the TXT will have formatting 
       limitations compared to the PDF and HTML.


    Submitting changes
    ------------------

    To submit changes, please reply to this email using ‘REPLY ALL’ as all 
    the parties CCed on this message need to see your changes. The parties 
    include:

       *  your coauthors

       *  rfc-editor@rfc-editor.org (the RPC team)

       *  other document participants, depending on the stream (e.g., 
          IETF Stream participants are your working group chairs, the 
          responsible ADs, and the document shepherd).

       *  auth48archive@rfc-editor.org, which is a new archival mailing list 
          to preserve AUTH48 conversations; it is not an active discussion 
          list:

         *  More info:
            https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc

         *  The archive itself:
            https://mailarchive.ietf.org/arch/browse/auth48archive/

         *  Note: If only absolutely necessary, you may temporarily opt out 
            of the archiving of messages (e.g., to discuss a sensitive matter).
            If needed, please add a note at the top of the message that you 
            have dropped the address. When the discussion is concluded, 
            auth48archive@rfc-editor.org will be re-added to the CC list and 
            its addition will be noted at the top of the message. 

    You may submit your changes in one of two ways:

    An update to the provided XML file
     — OR —
    An explicit list of changes in this format

    Section # (or indicate Global)

    OLD:
    old text

    NEW:
    new text

    You do not need to reply with both an updated XML file and an explicit 
    list of changes, as either form is sufficient.

    We will ask a stream manager to review and approve any changes that seem
    beyond editorial in nature, e.g., addition of new text, deletion of text, 
    and technical changes.  Information about stream managers can be found in 
    the FAQ.  Editorial changes do not require approval from a stream manager.


    Approving for publication
    --------------------------

    To approve your RFC for publication, please reply to this email stating
    that you approve this RFC for publication.  Please use ‘REPLY ALL’,
    as all the parties CCed on this message need to see your approval.


    Files 
    -----

    The files are available here:
       https://www.rfc-editor.org/authors/rfc9303.xml
       https://www.rfc-editor.org/authors/rfc9303.html
       https://www.rfc-editor.org/authors/rfc9303.pdf
       https://www.rfc-editor.org/authors/rfc9303.txt

    Diff file of the text:
       https://www.rfc-editor.org/authors/rfc9303-diff.html
       https://www.rfc-editor.org/authors/rfc9303-rfcdiff.html (side by side)

    Diff of the XML: 
       https://www.rfc-editor.org/authors/rfc9303-xmldiff1.html

    The following files are provided to facilitate creation of your own 
    diff files of the XML.  

    Initial XMLv3 created using XMLv2 as input:
       https://www.rfc-editor.org/authors/rfc9303.original.v2v3.xml 

    XMLv3 file that is a best effort to capture v3-related format updates 
    only: 
       https://www.rfc-editor.org/authors/rfc9303.form.xml


    Tracking progress
    -----------------

    The details of the AUTH48 status of your document are here:
       https://www.rfc-editor.org/auth48/rfc9303

    Please let us know if you have any questions.  

    Thank you for your cooperation,

    RFC Editor

    --------------------------------------
    RFC9303 (draft-ietf-lisp-sec-29)

    Title            : LISP-Security (LISP-SEC)
    Author(s)        : F. Maino, V. Ermagan, A. Cabellos, D. Saucez
    WG Chair(s)      : Joel M. Halpern, Luigi Iannone
    Area Director(s) : Alvaro Retana, John Scudder, Andrew Alston