Hi all.

5 more issues.

Issue #153 - List of EAP methods
================================
3.16: I suggest to remove the table quoted from the EAP RFC. There are dozens 
of methods now in the IANA registry, many of which are preferable to the ones 
mentioned here.

I agree, especially since we have a SHOULD NOT for using methods 4-6. I suggest 
removing the entire table (and the sentence "The following types are 
defined..." which precedes it. Instead, change the following paragraph to read 
as follows (added comment in parenthesis):

   Note that since IKE passes an indication of initiator identity in
   message 3 of the protocol, the responder should not send EAP Identity
   requests (type 1).  The initiator may, however, respond to such requests
   if it receives them.



Issue #154 - Sending dummy messages during rekey
================================================
Sec. 2.8: "An initiator MAY send a dummy message on a newly created SA if it 
has no messages queued in order to assure the responder that the initiator is 
ready to receive messages." 
A dummy (higher level protocol) message on an IPsec SA is way out of scope. 
Whether such messages even exist is a matter of local implementation. 
Or does the document refer to "dummy ESP messages" (RFC 4303, sec. 2.6)? If so, 
please add the reference.

I suspect that some implementations do not implement TFC, and so had no reason 
to implement dummy messages. If this was a MUST here or even a SHOULD, I would 
definitely object, but this is a MAY-level requirement.

I think we can close this by replacing "MAY send a dummy message on a newly 
created SA..." with "MAY send a dummy ESP message on a newly created ESP SA..." 
 (added ESP twice, because there are no dummy messages in AH), and add a 
normative reference to RFC 4303 - no need IMO to link from the text.



Issue #155 - SHOULD send triggering packet and interoperability
===============================================================
In the sectioon 2.9 the "SHOULD" requirement was removed for the very specific 
traffic selector as fist traffic selector. 

I think that "SHOULD" requirement needs to be kept, as it affects 
interoperability, as if other end does not include that triggering packet then 
certain policies cannot interoperate. 

Also in the interops we have seen implementations who could not interoperate at 
all if sender end included triggering packet (I do not know if the failure to 
create Child SA was because the traffic selector containing port selectors, or 
whether it was because there were multiple traffic selectors). 

If there is "SHOULD" level requirement for that, then we can at least point the 
other vendors to that and say, that as we SHOULD be sending that triggering 
packet, then you also needs to be able to cope with it... 

Old text was: 

To enable the responder to choose the appropriate range in this case, if the 
initiator has requested the SA due to a data packet, the initiator SHOULD 
include as the first traffic selector in each of TSi and TSr a very specific 
traffic selector including the addresses in the packet triggering the request. 

new text in draft-ietf-ipsecme-ikev2bis-07.txt is: 

If the initiator requests an SA because it wants to send a data packet, 
including the specific addresses in the packet triggering the request in the 
first traffic selector in both TSi and TSr enables the responder to choose the 
appropriate range.

I agree with Tero here. I think the SHOULD should come back.



Issue #156 - SHOULD generate and accept which types?
====================================================
Section 3.5 lists a bunch of ID types (ID_IPV4_ADDR, ID_FQDN, ID_RFC822_ADDR, 
ID_IPV6_ADDR, ID_DER_ASN1_DN, ID_DER_ASN1_GN, and ID_KEY_ID), and then says: 

Two implementations will interoperate only if each can generate a type of ID 
acceptable to the other. To assure maximum interoperability, implementations 
MUST be configurable to send at least one of ID_IPV4_ADDR, ID_FQDN, 
ID_RFC822_ADDR, or ID_KEY_ID, and MUST be configurable to accept all of these 
types. Implementations SHOULD be capable of generating and accepting all of 
these types. IPv6-capable implementations MUST additionally be configurable to 
accept ID_IPV6_ADDR. IPv6-only implementations MAY be configurable to send only 
ID_IPV6_ADDR. 

What does " Implementations SHOULD be capable of generating and accepting all 
of these types" mean? It can't mean the four just listed, because that list of 
four comes with MUSTs. If it means all the listed types, the sentence should be 
changed to "Implementations SHOULD also be capable of generating ID_IPV6_ADDR, 
ID_DER_ASN1_DN, and ID_DER_ASN1_GN."


Unlike the other issues in this mail, this one generated a lively debate, that 
quickly went to requirements for PKIX. Valery made a (to mind mind valid) point 
that the requirements in section 4 specify certificates with RSA keys, where 
other algorithms are available: GOST, DSA and ECDSA. While this is a valid 
point, criticism of section 4 should be in another issue, so I suggest going 
with Pasi's recommendation, and keeping the text as is.



Issue #157 - Illustrate the SA payload with a diagram
=====================================================
The text in 3.3 requires "peace of mind" to fully appreciate. A diagram might 
be helpful. 

"The margin is too narrow for a diagram" (Trac munges my diagram and will not 
take attachments). Will be sent separately to the list.

Everybody likes illustrations. Yaron made one, Tero improved on this, and 
several people commented, for a total of 11 messages to the list.  The final 
version is Tero's, which kind of looks cramped, but I think should be added. 
(what ever happened to that draft about adding graphics to RFCs?)

                          SA Payload
                              |
           +------------------+---------------------------+
           |                                              |
           |                                              |
       Proposal #1                                    Proposal #2
   Proto ID = ESP (3)                             Proto ID = ESP (3)
     SPI size = 4                                   SPI size = 4
     7 transforms                                   4 transforms
   SPI = 0x95903423                               SPI = 0x12345678
           |                                              |
  +------+-+----+------+------+------+------+      +------+------+------+
  |      |      |      |      |      |      |      |      |      |      |
 Trans  Trans  Trans  Trans  Trans  Trans  Trans  Trans  Trans  Trans  Trans
 form   form   form   form   form   form   form   form   form   form   form
 ENCR   INTEG  ENCR   INTEG  ENCR    ESN   ESN    ENCR   ESN    ENCR   ESN
 ENCR   AUTH   ENCR   AUTH   ENCR    No    Use    AES-   No     AES-   Use
 _AES   _HMAC  _AES   _AES   _AES    ESN   ESN    GCM    ESN    GCM    ESN
 _CBC   _SHA1  _CBC   _XCBC  _CBC     0     1     w/8     0     w/8     1
   |    _96      |    _96      |                  octet         octet
   |             |             |                  ICV           ICV
   |             |             |                   |             |
   |             |             |                   |             |
Attribute     Attribute     Attribute           Attribute     Attribute
Key Length    Key Length    Key Length          Key Length    Key Length
   128           192           256                 128           256

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to