That would work very well for me.  Thank you for addressing my concerns.
Yours,
Joel

On 10/8/15 10:20 AM, Daniel Migault wrote:
Hi Joel,

Thank you for taking time to review and comment the draft.

We propose to add the following text to clarify the example in section 2 before 
the two last paragraphs. The following text expects to clarify the following 
points:
    - 1) The creation of VPN is a local policy matter
    - 2) Moving one duplicated VPN to different interfaces may involve multiple 
MOBIKE operations
    - 4) There is no needs to create all possible VPNs ( might be similar to 
item 1)

The following text has been added to our local copy. If you would like us to 
publish a new version, feel free to let us know. Our intention is to keep the 
updates local until you ask us to publish the draft.

BR,
Daniel and Valery

NEW TEXT -- BEGIN
Note that it is up to host's local policy which additional VPNs to create and
when to do it. The process of selecting address pairs for migration is
  a local matter. Furthermore, in the case of multiple interfaces on
  both ends care should be taken to avoid the VPNs to be duplicated by both 
ends or moved to the both interfaces.

  In addition multiple MOBIKE operation may be involved from the
  Security Gateway or the VPN End User.
  Suppose, as depicted in Figure 3 for example that the cloned VPN is
  between Interface _0 and Interface_0', and the VPN End User and the
  Security Gateway wants to move it to Interface_1 and Interface_1'. The
  VPN End User may initiate a MOBIKE exchange in order to move it to
  Interface_1, in which case the cloned VPN is now between Interface_1
  and Interface_0'. Then the Security Gateway may also initiate a MOBIKE 
exchange in order to move the VPN to Interface_1' in which case the VPN has 
reached its final destination.
NEW TEXT -- END

-----Original Message-----
From: Joel M. Halpern [mailto:j...@joelhalpern.com]
Sent: Friday, October 02, 2015 1:25 PM
To: A. Jean Mahoney; General Area Review Team; 
draft-mglt-ipsecme-clone-ike-sa....@ietf.org
Subject: [Gen-art] Review: draft-mglt-ipsecme-clone-ike-sa-05.txt

I am the assigned Gen-ART reviewer for this draft. The General Area Review Team 
(Gen-ART) reviews all IETF documents being processed by the IESG for the IETF 
Chair.  Please treat these comments just like any other last call comments.

For more information, please see the FAQ at

<http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq>.

Document: draft-mglt-ipsecme-clone-ike-sa-05.txt
Cloning IKE SA in the Internet Key Exchange Protocol Version 2 (IKEv2)

Reviewer: Joel M. Halpern
Review Date: 2-Oct-2015
IETF LC End Date: 27-Oct-2015
IESG Telechat date: N/A

Summary: This document is nearly ready for publication as a Propsoed Standard 
RFC.

Major issues:
      The introductory material talks about the case where both sides have 
multiple interfaces.  It is not clear what will happen with this mechanism in 
that case.
      In particular, if I have two systems, with three interfaces, it seems 
that this will start by creating the S1-D1 Security Association.
It seems straightforward for each side to create their simple additional 
assocations (S2-D1, S3-D1, and S1-D2, S1-D3).
      But the introduction suggests that we also want to create S2-D2, S3-D3, 
S2-D3, and S3-D2.  With no other guidance, it appears that both sides will try 
to create all four of those, creating 8 security associations instead of 4.
      I hope that I have simply missed something in the document that resolves 
this.

Minor issues:

Nits/editorial comments:


_______________________________________________
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to