Re: [IPsec] comments on draft-ietf-ipsecme-g-ikev2-07

Paul Wouters <paul@nohats.ca> Tue, 10 January 2023 20:02 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 60AB3C09C92F for <ipsec@ietfa.amsl.com>; Tue, 10 Jan 2023 12:02:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.094
X-Spam-Level:
X-Spam-Status: No, score=-2.094 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nohats.ca
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M1VDXGgRKgJc for <ipsec@ietfa.amsl.com>; Tue, 10 Jan 2023 12:02:54 -0800 (PST)
Received: from mx.nohats.ca (mx.nohats.ca [IPv6:2a03:6000:1004:1::85]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6DC83C09A5A1 for <ipsec@ietf.org>; Tue, 10 Jan 2023 12:02:50 -0800 (PST)
Received: from localhost (localhost [IPv6:::1]) by mx.nohats.ca (Postfix) with ESMTP id 4Ns1vB4bpPzBJ; Tue, 10 Jan 2023 21:02:46 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1673380966; bh=A+kG8AvDDXFUNFMZ49GAdN5tleDd66dURs9ZQ3sRrvQ=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=rH5yfJwXWtYgJUQbgMU2USBv4CACglNYuiOZIskBSFeqf7hct1pAZjy0y9Ouy9vF9 wUKVqTTYBE32wFsmzBkKvLdSkG9K/Kuh6nxsJD6mWGPjgWeXsgB5Pgv5sMY1ti+gq6 LqsDEqvv7YrC7GBuMEWIw5GiwLK4+lejHFt0wPgo=
X-Virus-Scanned: amavisd-new at mx.nohats.ca
Received: from mx.nohats.ca ([IPv6:::1]) by localhost (mx.nohats.ca [IPv6:::1]) (amavisd-new, port 10024) with ESMTP id 0p83CgoE19Qw; Tue, 10 Jan 2023 21:02:45 +0100 (CET)
Received: from bofh.nohats.ca (bofh.nohats.ca [193.110.157.194]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx.nohats.ca (Postfix) with ESMTPS; Tue, 10 Jan 2023 21:02:45 +0100 (CET)
Received: by bofh.nohats.ca (Postfix, from userid 1000) id 997C4662DE6; Tue, 10 Jan 2023 14:53:37 -0500 (EST)
Received: from localhost (localhost [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id 94061662DE5; Tue, 10 Jan 2023 14:53:37 -0500 (EST)
Date: Tue, 10 Jan 2023 14:53:37 -0500
From: Paul Wouters <paul@nohats.ca>
To: Valery Smyslov <smyslov.ietf@gmail.com>
cc: "ipsec@ietf.org WG" <ipsec@ietf.org>, bew.stds@gmail.com
In-Reply-To: <27d301d9192b$645265b0$2cf73110$@gmail.com>
Message-ID: <cb8a195a-c9f4-2b84-bd40-91f0404cc8f6@nohats.ca>
References: <11505.1671563270@localhost> <257b01d9151c$a16579f0$e4306dd0$@gmail.com> <9470.1671641738@localhost> <261c01d915e3$50ef2670$f2cd7350$@gmail.com> <14222.1671724652@localhost> <268e01d916a2$1ad7bec0$50873c40$@gmail.com> <27837.1671814151@localhost> <27d301d9192b$645265b0$2cf73110$@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"; format="flowed"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/TmVO6LTW8F7_wQONcdp98mSVEWg>
Subject: Re: [IPsec] comments on draft-ietf-ipsecme-g-ikev2-07
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Jan 2023 20:02:59 -0000

On Mon, 26 Dec 2022, Valery Smyslov wrote:

> Subject: Re: [IPsec] comments on draft-ietf-ipsecme-g-ikev2-07

I know this comment comes very late, but within the IETF we now see
adoption happening of HPKE, Hybrid Public Key Encryption in RFC 9180.

Would it make sense to redo the draft using HPKE primitives and methods?

Paul - who still needs to do a full careful reading of the draft, sorry :/