Re: [IPsec] IPsecME WG Adoption call for draft-pwouters-ipsecme-multi-sa-performance

Christian Hopps <chopps@chopps.org> Mon, 14 November 2022 09:19 UTC

Return-Path: <chopps@chopps.org>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 29795C1524A9 for <ipsec@ietfa.amsl.com>; Mon, 14 Nov 2022 01:19:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.894
X-Spam-Level:
X-Spam-Status: No, score=-6.894 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ls7JopfujaiR for <ipsec@ietfa.amsl.com>; Mon, 14 Nov 2022 01:19:18 -0800 (PST)
Received: from smtp.chopps.org (smtp.chopps.org [54.88.81.56]) by ietfa.amsl.com (Postfix) with ESMTP id BD5B7C14EB1C for <ipsec@ietf.org>; Mon, 14 Nov 2022 01:19:18 -0800 (PST)
Received: from ja.int.chopps.org.chopps.org (172-222-091-149.res.spectrum.com [172.222.91.149]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (Client did not present a certificate) by smtp.chopps.org (Postfix) with ESMTPSA id A7E597D04F; Mon, 14 Nov 2022 09:14:10 +0000 (UTC)
References: <25451.58560.690380.833165@fireball.acr.fi> <F82E680F-DA37-4798-87C7-652C3FDF0D82@cisco.com> <20a6e992-49e8-ae88-8d8-35eefd4ffbc@nohats.ca>
User-agent: mu4e 1.8.5; emacs 28.0.92
From: Christian Hopps <chopps@chopps.org>
To: Paul Wouters <paul@nohats.ca>
Cc: "Pierre Pfister (ppfister)" <ppfister=40cisco.com@dmarc.ietf.org>, Tero Kivinen <kivinen@iki.fi>, ipsec@ietf.org
Date: Mon, 14 Nov 2022 04:13:54 -0500
In-reply-to: <20a6e992-49e8-ae88-8d8-35eefd4ffbc@nohats.ca>
Message-ID: <m2edu5hp9a.fsf@ja.int.chopps.org>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha512"; protocol="application/pgp-signature"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/YlcZf0Gmd_9hjhGnElBBuLL6DiU>
Subject: Re: [IPsec] IPsecME WG Adoption call for draft-pwouters-ipsecme-multi-sa-performance
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Nov 2022 09:19:23 -0000

Paul Wouters <paul@nohats.ca> writes:

> On Thu, 10 Nov 2022, Pierre Pfister (ppfister) wrote:
>
>> Since I doubt the working group would have the time and energy to work on two
>> different solutions, my support to this draft's adoption is conditioned to
>> whether the authors plan to consider addressing our concerns listed above.
>
> Speaking with no hats on here:
>
> Once the document is adopted, this question is not up to the authors but
> up to the working group.
>
>
> Putting author hat on:
>
> I think this solution is such a small solution and already has running
> code, that I would prefer the WG to quickly move this on, while also
> beginning a separate discussion on how to do various different scaling
> issues (and multi-cpu) in another way, eg by trying to work on an ESPv4
> version. But I would be sad if that work, which I expect will take some
> time, would delay this draft.

I agree with this, and support publication.

Thanks,
Chris.

>
> Paul
>
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec