[IPsec] Benjamin Kaduk's Discuss on draft-ietf-ipsecme-implicit-iv-07: (with DISCUSS and COMMENT)
Benjamin Kaduk via Datatracker <noreply@ietf.org> Mon, 14 October 2019 23:15 UTC
Return-Path: <noreply@ietf.org>
X-Original-To: ipsec@ietf.org
Delivered-To: ipsec@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id BF5151208E0; Mon, 14 Oct 2019 16:15:07 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Benjamin Kaduk via Datatracker <noreply@ietf.org>
To: The IESG <iesg@ietf.org>
Cc: draft-ietf-ipsecme-implicit-iv@ietf.org, Tero Kivinen <kivinen@iki.fi>, ipsecme-chairs@ietf.org, kivinen@iki.fi, ipsec@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.105.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: Benjamin Kaduk <kaduk@mit.edu>
Message-ID: <157109490777.24664.9512388993983573410.idtracker@ietfa.amsl.com>
Date: Mon, 14 Oct 2019 16:15:07 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/6dQTwAjk2DhNI0pOPmwToBKcRbo>
Subject: [IPsec] Benjamin Kaduk's Discuss on draft-ietf-ipsecme-implicit-iv-07: (with DISCUSS and COMMENT)
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Oct 2019 23:15:08 -0000
Benjamin Kaduk has entered the following ballot position for draft-ietf-ipsecme-implicit-iv-07: Discuss When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html for more information about IESG DISCUSS and COMMENT positions. The document, along with other ballot positions, can be found here: https://datatracker.ietf.org/doc/draft-ietf-ipsecme-implicit-iv/ ---------------------------------------------------------------------- DISCUSS: ---------------------------------------------------------------------- Please address the issue raised by the secdir reviewer where AES-CTR is covered in the text but no codepoint allocated. ---------------------------------------------------------------------- COMMENT: ---------------------------------------------------------------------- Section 2 nit: s/In some context/In some contexts/ This document limits its scope to the algorithms mentioned above. Other algorithms with similar properties may later be defined to use this extension. I'd suggest rewording this part; the "extension" here is just the per-algorithm codepoint for the IIV variant of the encryption transform, so what would be reused is probably better described as a "mechanism" or similar than an "extension". Section 4. With the algorithms listed in Section 2, the 8 byte nonce MUST NOT repeat. The binding between a ESP packet and its nonce is provided I suggest s/MUST NOT repeat/MUST NOT repeat for a given key/. nit: s/a ESP/an ESP/ Section 4 This document solely defines the IV generation of the algorithms defined in [RFC4106] for AES-GCM, [RFC4309] for AES-CCM and [RFC7634] for ChaCha20-Poly1305. Any other aspect (including using the Key Length attribute) of applying those ciphers with the new Transform Types defined in this document MUST be taken from the documents defining the use of the algorithms in ESP. I suggest s/defines/modifies/; the whole paragraph is slightly confusing to read and could perhaps be reworded to something like "This document solely modifies the IV generation for the algorithms defined in [RFC4106] for AES-GCM, [RFC4309] for AES-CCM and [RFC7634] for ChaCha20-Poly1305. All other aspects and parameters of those algorithms are unchanged, and are used as defined in their respective specifications." Section 7 nit: the title should be "Security Considerations" plural. I suggest to reiterate the RFC 4303 requirement for SAs to be closed or rekeyed before sequence numbers grow too large to fit in 32 bits (for "legacy" Sequence Number) or 64 bits for ESN. This prevents sequence number overlaps for the mundane point-to-point case. This document defines three new encryption transforms that use implicit IV. Unlike most encryption transforms defined to date, which can be used for both ESP and IKEv2, these transforms are defined for ESP only and cannot be used in IKEv2. The reason is that IKEv2 messages don't contain unique per-message value, that can be used for IV generation. The Message-ID field in IKEv2 header is nit: s/unique/a unique/ nit: s/value,/value/
- [IPsec] Benjamin Kaduk's Discuss on draft-ietf-ip… Benjamin Kaduk via Datatracker
- Re: [IPsec] Benjamin Kaduk's Discuss on draft-iet… Daniel Migault