Re: [Schc] [IPsec] WG Adoption calls for draft-mglt-ipsecme-diet-esp and draft-mglt-ipsecme-ikev2-diet-esp-extension

"Eric Vyncke (evyncke)" <evyncke@cisco.com> Tue, 12 December 2023 11:33 UTC

Return-Path: <evyncke@cisco.com>
X-Original-To: schc@ietfa.amsl.com
Delivered-To: schc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1AF21C151077; Tue, 12 Dec 2023 03:33:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.604
X-Spam-Level:
X-Spam-Status: No, score=-9.604 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4NxkfoHAZgjK; Tue, 12 Dec 2023 03:33:39 -0800 (PST)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 48258C15106B; Tue, 12 Dec 2023 03:33:39 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; i=@cisco.com; l=24882; q=dns/txt; s=iport; t=1702380819; x=1703590419; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=7GTKowbvyCHE26tEyhgZM9127fYdLaV7rUM+rh4AssE=; b=P5prJCQy76eNaynM/+23tl9lt2+WdstIcjN9GGlQfurfTX9+NiOizefN eiIJ7e7o7CvrwZwef9Ei150rbMj3f0qrPmwkCrDG5I/A6SV6tMpHGH7Da 9+0hU2/iAz3TNNWyxoDr91TsKOwzkOAs4wJepua/+BrYETx6XBYY1Emb8 A=;
X-CSE-ConnectionGUID: 3eN/9e9zRLqK9DsL2lFsOQ==
X-CSE-MsgGUID: uc6wqSRgRcWzFStnGdbh6A==
X-IPAS-Result: A0AIAABrRHhlmJBdJa1aGwEBAQEBAQEBBQEBARIBAQEDAwEBAWWBFgYBAQELAYE1MVJ5Alo8SIRSg0wDhE5fiGcDi1ySIoF+DwEBAQ0BAS4BCgsEAQGFBgIWhxgCJjQJDgECBAEBAQEDAgMBAQEBAQEBAQYBAQUBAQECAQcEFAEBAQEBAQEBHhkFEA4nhWgNhkUBAQEBAwEBEAsGSwsQAgEGAhEDAQIBIwQDAgICHwYLFAkIAgQBDQUIEweCXgGCFhQDMQMBEJIgj04BgUACiih6gTKBAYIVBbAYDYJOBoFIAYdzHgGBTgEBgWqGZScbgUlEgRVCgjcxPoIfQgEBAoFgHhaDJTmCLwSGUYIDFS4HMoEJDAkqhCuDB44EWyJGcBsDBwN/DysHBDAbBwYJFBgVIwZRBCghCRMSQIFdgVIKgQE/Dw4Rgj4fAgc2NhlIgloVBjpKdRAqBBQXgQkIBGobEx43ERIFEg0DCHQdAjI8AwUDBDMKEg0LIQUUQgNFBkkLAwIaBQMDBIEzBQ0eAhAaBgwnAwMSSQIQFAM7AwMGAwoxAzBVRAxPA2kfNgk8CwQMHQIbHg0nIwIsQgMRBRICFgMkFgQ2EQkLKAMvBjgCEwwGBgleJhYJBCcDCAQDVAMjbwNEHUADC209NRQbBQRkWQWgcw8sD3sBgi40ECYBA1NQC4EnARAfCzqWMosMokBvCoQPjAKPGIYpF6kjZJhDII1Ig3aRRYUMAgQCBAUCDgEBBoFjOoFbcBU7gjMBATJSGQ+LA4MpDQkWiFSKZXYCATgCBwEKAQEDCYhwLYFEAQE
IronPort-PHdr: A9a23:ASP+0BeWteQDBCTLIDmuH8zPlGM/foqcDmcuAtIPgrZKdOGk55v9e RWZ7vR2h1iPVoLeuLpIiOvT5rjpQndIoY2Av3YLbIFWWlcbhN8XkQ0tDI/NCUDyIPPwKS1vN M9DT1RiuXq8NBsdA97wMmXbuWb69jsOAlP6PAtxKP7yH9vfkdWx3OO/05bSeA5PwjG6ZOA6I BC/tw6ErsANmsMiMvMo1xLTq31UeuJbjW9pPgeVmBDxp4+8qZVi6C9X/fkm8qZ9
IronPort-Data: A9a23:213nJaAQDHD2+BVW/yXjw5YqxClBgxIJ4kV8jS/XYbTApDkq1zUFy GQcW23XOPiCY2egfYh2bY+wo0sC75HRm9NiOVdlrnsFo1CmBibm6XV1Cm+qYkt+++WaFBoPA /02M4SGdIZsCCaE+n9BC5C5xVFkz6aEW7HgP+DNPyF1VGdMRTwo4f5Zs7ZRbrVA357hX2thh fuo+5eEYQX8gWYtWo4pw/vrRC1H7ayaVAww5jTSVdgT1HfCmn8cCo4oJK3ZBxMUlaENQ4ZW7 86apF2I1juxEyUFU7tJoZ6nGqE+eYM+CCDV4pZgtwdOtTAZzsA6+v5T2PPx8i67gR3R9zx64 I0lWZBd1W7FM4WU8NnxXSW0HAklMIsBqbKWM0KbqO/C41biKX/C2NJXWRRe0Y0woo6bAElU/ vAebTsKdB3G16S9wamwTa9ngcFLwMvDZdxE/Co/i2CCS696HfgvQI2SjTNc9Doul8ZFHvv2b MsCYj0pZxPFC/FKEg5KWclmx7b43RETdRVFowyKvJEN7FLY8x5f66TrH9bfeoKjEJA9ckGw/ T+eoD+jXXn2Lue30jGF+Vqti/PB2yThV+o6FaWj+/VCgVCPyCoUEhJ+aLegieOyhkj7UNVFJ glEvCEvtqM1skesS7ERQiFUvlbfszhbCtcBAdce8SLc5rHwuQK3HU89G2sphMMdiOc6Qjkj1 1msltzvBCByvLD9dZ573unMxd9VEXZNRVLudRM5oR05D84PSbzfYzrVRdplVaWylNCwSXf7w iuBq241gLB7YS83O0eTowyvb9GE/8ShousJCuP/BTPNAuRRONTNWmBQwQKHhcus1a7AJrV7g FAKmtKF8McFBoyXmSqGTY0lRe7xva3cYWGM2g8/RvHNEghBHVb9JOi8BxkgfS9U3josIGaBj LL74FoOu8ELZBNGk4ctM9PvYyjV8UQQPY+4Dq+PNIUmjmlZfw6c9yYmfl+Lw23oiwAtl6p5U ap3gu7yZUv2/Z9PlWLsL89EiOdD7nlnlQv7G8uhpzz5iuX2WZJgYepfWLd4RrpnvPrsTcS82 4s3CvZmPD0GD7ekO3WHq9JDRb3IRFBiba3LRwVsXrfrCiJtGXoqDLnaxrZJRmCvt/09ejvgl p1lZnJl9Q==
IronPort-HdrOrdr: A9a23:+cfliqHSNIKPRDPbpLqFoZLXdLJyesId70hD6qkvc203TiXIra CTdaogtCMc0AxhJk3I+ertBEGBKUmsk6KdkrNhTItKPTOW9FdAQ7sSl7cKrweQfxEWs9Qtqp uIEJIOR+EYb2IK8PoSiTPQe71Psbv3lZxAx92us0uFJjsaEp2Imj0JcTpzZXcGPDWua6BJc6 a0145snRblU3IRaciwG3kCWMb+h/CjrvjbSC9DLSQKrC2Vgx2VyJOSKXWlNxElPA9n8PMHyy zoggb57qKsv7WQ0RnHzVLe6JxQhZ/I1sZDLNbksLlVFhzcziKTIKhxUbyLuz445Mu17kwxrd XKqxA8e+xu9nLqeH2vqxeF4Xih7N9u0Q6g9baruwqnnSXLfkN/NyOHv/MfTvLt0TtjgDi76t MM44vWjesPMfqKplWM2zGBbWAYqqPzmwttrQbW5EYvCrf3r9Rq3NQi1VIQH5EaEC3g7oc7VO FoEcHH/f5TNUiXdnbDowBUsZeRt1kIb167q3I5y4So+ikTmGo8w1oTxcQZkHtF/JUhS4Nc7+ CBNqhzjrlBQsIfcKo4XY46MIaKI32IRQiJPHOZIFzhGq1CM3XRq4Tv6LFw4O2xYpQHwJY7hZ yEWlJFsmw5fV7oFKS1rdd22wGIRH/4USXmy8lY6ZQ8srrgRKDzOSnGU1wqm9vImYRoPiQaYY fFBHt7OY6WEYK1I/c64+TXYegmFUUj
X-Talos-CUID: 9a23:rGtFXG+9U/InafMh/ICVvxUZPId0fyzP9lPJAB6UEkIzTJOObmbFrQ==
X-Talos-MUID: 9a23:tiHrfgSFWCWBfx05RXTxj299LfxS7J6lN1IjqokAlMWONXJZbmI=
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-8.cisco.com ([173.37.93.144]) by rcdn-iport-2.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Dec 2023 11:33:37 +0000
Received: from alln-opgw-1.cisco.com (alln-opgw-1.cisco.com [173.37.147.229]) by rcdn-core-8.cisco.com (8.15.2/8.15.2) with ESMTPS id 3BCBXbtE003566 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Dec 2023 11:33:37 GMT
X-CSE-ConnectionGUID: eceLuucHRZ6J3juL6OhEKA==
X-CSE-MsgGUID: +cq0UmKKQ163t8tnNV5L9Q==
Authentication-Results: alln-opgw-1.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=evyncke@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.04,270,1695686400"; d="scan'208,217";a="14636526"
Received: from mail-co1nam11lp2168.outbound.protection.outlook.com (HELO NAM11-CO1-obe.outbound.protection.outlook.com) ([104.47.56.168]) by alln-opgw-1.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Dec 2023 11:33:36 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Nr6QpSa0sLZp7jT9C84WLUtARN8lBjcZT+ktQT/PoRFcjr2nLYLBAG94DvuDIMco/GUfN9ClKqGIWfLOHQbyfYtcL9KdOmOMF606R/QzLomoYCh3esbjrnYcUR4xNlDVgpjcLTmg+D82dWw4JrTRk8HNeLULa8Z6mglX7jD4eS3zOSEoBu4+X1SiwBDte1rkmwnlJ/qEYzGsZAOhspcrqXTv4Hibvve4FLxRnCfWw6BjF6vmG8ueZADNIyoeFDTABZp2rCkfHg9pv5gowVIteWVsXULsU9GvQJzrAtLKgXmFqBCW8Sw1BGHNVsnfLjuVtUw2LWXbcKlmCBNA6raNBg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=7GTKowbvyCHE26tEyhgZM9127fYdLaV7rUM+rh4AssE=; b=DXL8Q0+7Nekebt5YXzGl4HB4w/o6P+8OsgpB/Qr9GeSdt6pRlXwea1uku2Sf0edRcY7sfDjcWrNMGNbJl1R7iNboPNm2367CB6v0zpKvoeK+OVO4D04iK8OLkgjbXfE13yjnlun7jGyuXSfA+qjanX6ZQ9QE83GRkdhpwsx+jBEiVxXxUv2+DjMmoeACy9mooW7b8w6Kc4/Hqu2ivJKxdglcFKW37OwtTlFTluOHfCIpXBvlscAKRjz/JiTFQr5+C03H1EBKP5vpAOgBaFt2SFG3thw74X0hvQqIwkOptLbqt2BJAaq0FTD7BPgCSbJSMfPhmbFpok+0bQyPymX3/A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
Received: from PH0PR11MB4966.namprd11.prod.outlook.com (2603:10b6:510:42::21) by PH0PR11MB4968.namprd11.prod.outlook.com (2603:10b6:510:39::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7068.32; Tue, 12 Dec 2023 11:33:34 +0000
Received: from PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::4354:3cc:1204:95d6]) by PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::4354:3cc:1204:95d6%4]) with mapi id 15.20.7068.031; Tue, 12 Dec 2023 11:33:34 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: Hannes Tschofenig <hannes.tschofenig=40gmx.net@dmarc.ietf.org>, Daniel Migault <mglt.ietf@gmail.com>
CC: "ipsec@ietf.org" <ipsec@ietf.org>, "schc@ietf.org" <schc@ietf.org>
Thread-Topic: [Schc] [IPsec] WG Adoption calls for draft-mglt-ipsecme-diet-esp and draft-mglt-ipsecme-ikev2-diet-esp-extension
Thread-Index: AQHaLCtNIEaB4r2kp0eqXtVW0rOiTbCkGmOAgAA07QCAATWt6A==
Date: Tue, 12 Dec 2023 11:33:34 +0000
Message-ID: <PH0PR11MB4966CEB435E701767E3B1F43A98EA@PH0PR11MB4966.namprd11.prod.outlook.com>
References: <25956.57621.119376.885412@fireball.acr.fi> <17960EC2-8E9B-4ABA-A86F-5F89C03C2BA9@tzi.org> <d268eb55-6e98-4c97-92ff-c3f7077e5f16@gmx.net> <CADZyTk=j=Wsd9CeS3LY3cH6AgD+A0e3uRftFRX7C2+d+7vBUhw@mail.gmail.com> <b4199538-a09d-4e49-a960-0adbfb84946a@gmx.net>
In-Reply-To: <b4199538-a09d-4e49-a960-0adbfb84946a@gmx.net>
Accept-Language: fr-BE, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH0PR11MB4966:EE_|PH0PR11MB4968:EE_
x-ms-office365-filtering-correlation-id: d9642c58-114a-4d2f-f232-08dbfb062d1b
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB4966.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(39860400002)(396003)(346002)(366004)(136003)(376002)(230922051799003)(1800799012)(64100799003)(451199024)(186009)(86362001)(53546011)(7696005)(6506007)(2906002)(4001150100001)(66556008)(110136005)(66446008)(66946007)(66476007)(64756008)(54906003)(52536014)(9686003)(71200400001)(122000001)(166002)(33656002)(38100700002)(8676002)(4326008)(8936002)(5660300002)(316002)(55016003)(76116006)(478600001)(966005)(41300700001)(38070700009)(26005); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_PH0PR11MB4966CEB435E701767E3B1F43A98EAPH0PR11MB4966namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4966.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d9642c58-114a-4d2f-f232-08dbfb062d1b
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Dec 2023 11:33:34.7820 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: /wTOWTSCQpPY8MinejYbNKqblNOZaWfGbXvh7ucXlhNVIE6LiiarDVT1TkCYWsYMuYqaCgrTLg6/wP2BiUSFRA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR11MB4968
X-Outbound-SMTP-Client: 173.37.147.229, alln-opgw-1.cisco.com
X-Outbound-Node: rcdn-core-8.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/schc/COf3awawdFZRU3YS-CsMtnTOrTI>
Subject: Re: [Schc] [IPsec] WG Adoption calls for draft-mglt-ipsecme-diet-esp and draft-mglt-ipsecme-ikev2-diet-esp-extension
X-BeenThere: schc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Static Context Header Compression <schc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/schc>, <mailto:schc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/schc/>
List-Post: <mailto:schc@ietf.org>
List-Help: <mailto:schc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/schc>, <mailto:schc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Dec 2023 11:33:44 -0000

Let me reply to Hannes’ statement: “Integrating the functionality into SCHC alone is not enough.”

I consider SCHC as a technical mean and not an end. I.e., it is not about adding IPsec to SCHC but rather about using SCHC to compress IPsec (= ESP & IKE). The SCHC WG did a similar work with COAP.

Regards

-éric

From: Schc <schc-bounces@ietf.org> on behalf of Hannes Tschofenig <hannes.tschofenig=40gmx.net@dmarc.ietf.org>
Date: Monday, 11 December 2023 at 18:03
To: Daniel Migault <mglt.ietf@gmail.com>, Hannes Tschofenig <hannes.tschofenig=40gmx.net@dmarc.ietf.org>
Cc: Carsten Bormann <cabo@tzi.org>, Tero Kivinen <kivinen@iki.fi>, ipsec@ietf.org <ipsec@ietf.org>, schc@ietf.org <schc@ietf.org>
Subject: Re: [Schc] [IPsec] WG Adoption calls for draft-mglt-ipsecme-diet-esp and draft-mglt-ipsecme-ikev2-diet-esp-extension

Hi Daniel, Hi all,



don't get me wrong: I am trying to be helpful.


Integrating the functionality into SCHC alone is not enough. You need to integrate it into an implementation of IKEv2/IPsec that is suitable to the mentioned constrained IoT use cases. I have not seen IPsec/IKEv2 being used in constrained environments so far nor have I seen a "lightweight" implementation for microcontrollers.



I have, however, heard about uses of WireGuard on Linux-based IoT devices (these are non-constrained devices, obviously) with the argument that it is simple to use and efficient.



I believe it is worthwhile to think about the motivation of using WireGuard instead of IPsec/IKEv2 instead of spending a lot of time on yet another tiny optimization.



Hence, I would aim for a more ambitious goal: Make IPsec/IKEv2 work well on Linux-based IoT devices (*)



Ciao

Hannes



*: Forget the constrained IoT device use case - there are better solutions available that don't require IPsec/IKEv2


Am 11.12.2023 um 14:53 schrieb Daniel Migault:
Hi Hannes,

One draft is esp, the other is ikev2, I tend to think it would be better to have two separate documents.

Validation of specification SCHC will be supported by implementations and I am aware of two ongoing implementations based on openschc. I am also aware of 2 implementations that do not rely on SCHC. One implementation on contiki and one in python (not public).
https://bitbucket.org/sylvain_www/diet-esp-contiki/src/master/

We are working on an implementation. What is not completely clear to me now is how we will be able to have/make public implementations for linux implementation and potentially *Swan projects. It is a bit too early for now, but I am hoping to have a path in the next coming months.

As far as I know ROHC is still used, but I do not know how ROHC is specifically used for IPsec traffic.

Yours,
Daniel

On Mon, Dec 11, 2023 at 7:12 AM Hannes Tschofenig <hannes.tschofenig=40gmx.net@dmarc.ietf.org<mailto:40gmx.net@dmarc.ietf.org>> wrote:
Shouldn't the two drafts be merged?


Who of the authors is going to implement the specs?


Ciao
Hannes


@Carsten: I have not been following the ROHC work after standardization
was completed. Was it actually used? Is it still used?


Am 30.11.2023 um 14:09 schrieb Carsten Bormann:
> As a co-author of draft-mglt-ipsecme-diet-esp, I do support this work (as well as the accompanying draft-mglt-ipsecme-ikev2-diet-esp-extension) and plan to continue working on it.
>
> We did the equivalent of these two drafts for ROHC in RFC 5856 to 5858.
> The current work is an obvious missing link for SCHC that needs to be filled in, just as we did for ROHC in 2010.
>
> Grüße, Carsten
>
>
>> On 2023-11-27, at 19:33, Tero Kivinen <kivinen@iki.fi<mailto:kivinen@iki.fi>> wrote:
>>
>> This is two week adoption call for draft-mglt-ipsecme-diet-esp. If you
>> support adopting this document as a working group document for IPsecME
>> to work on, and then at some point publish this as an RFC, send
>> comments to this list.
>>
>> This adoption call ends 2023-12-13.
>>
>> Note, that I do want to see people saying that they think this
>> document is worth of working on, and that they plan to review and
>> comment on it. If I only get one or two people (including authors :-)
>> to say they support this work, then there is no point of work on this
>> in WG.
>> --
>> kivinen@iki.fi<mailto:kivinen@iki.fi>
>>
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org<mailto:IPsec@ietf.org>
> https://www.ietf.org/mailman/listinfo/ipsec

_______________________________________________
IPsec mailing list
IPsec@ietf.org<mailto:IPsec@ietf.org>
https://www.ietf.org/mailman/listinfo/ipsec


--
Daniel Migault
Ericsson



_______________________________________________

IPsec mailing list

IPsec@ietf.org<mailto:IPsec@ietf.org>

https://www.ietf.org/mailman/listinfo/ipsec