Hi Vijay,

Here's a bunch of comments on the latest draft, some minor, some not so
minor.

Thanks,
        Yaron

- 1: During during -> during
- 1: Can be also be -> can also be
- 3: I suggest to start this section with an exhaustive list of locations
where the Redirect payload can occur (IKA_SA_INIT response, IKE_AUTH last
response, Informational from gateway).
- 3: "The VPN client indicates support for the IKEv2 redirect mechanism by
including..." -> By including ..., the VPN client indicates that it supports
the IKEv2 redirect mechanism and that it is willing to be redirected.
- 3: "It initiates a new IKE_SA_INIT exchange with the VPN gateway listed in
the REDIRECT payload", add: "provided this is allowed by its IPsec policy".
- 3: The last paragraph (re: MIP6) is out of context here, and I was unable
to understand it. I suggest to clarify and extend it into a separate
section.
- 5: "If the gateway decides to redirect the client during the IKE_AUTH
Exchange..." - this should start a new section.
- Same paragraph: add "The gateway MUST verify the client's AUTH payload
before sending the Redirect payload, and the client MUST verify the
gateway's AUTH payload before acting on the Redirect payload."
- "In case the IKE_AUTH exchange involves EAP authentication" - add: "The
gateway MUST NOT send and the client MUST NOT accept a redirect in any
earlier message."
- 6.2: Now that we've appended the nonce, we should signal the length of the
Identity field explicitly (possibly by stealing 1 octet from the Identity
Type). Even though the client can theoretically compute it using the length
of the expected nonce.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to