Yoav Nir writes:
> Issue #153 - List of EAP methods
> ================================
> ...
> I agree, especially since we have a SHOULD NOT for using methods
> 4-6. I suggest removing the entire table (and the sentence "The
> following types are defined..." which precedes it. Instead, change
> the following paragraph to read as follows (added comment in
> parenthesis): 
> 
>    Note that since IKE passes an indication of initiator identity in
>    message 3 of the protocol, the responder should not send EAP Identity
>    requests (type 1).  The initiator may, however, respond to such requests
>    if it receives them.

I support this change.

> Issue #154 - Sending dummy messages during rekey
> ================================================
> Sec. 2.8: "An initiator MAY send a dummy message on a newly created
> SA if it has no messages queued in order to assure the responder
> that the initiator is ready to receive messages."  
> A dummy (higher level protocol) message on an IPsec SA is way out of
> scope. Whether such messages even exist is a matter of local
> implementation.  
> Or does the document refer to "dummy ESP messages" (RFC 4303, sec.
> 2.6)? If so, please add the reference. 
> 
> I suspect that some implementations do not implement TFC, and so had
> no reason to implement dummy messages. If this was a MUST here or
> even a SHOULD, I would definitely object, but this is a MAY-level
> requirement. 
> 
> I think we can close this by replacing "MAY send a dummy message on
> a newly created SA..." with "MAY send a dummy ESP message on a newly
> created ESP SA..."  (added ESP twice, because there are no dummy
> messages in AH), and add a normative reference to RFC 4303 - no need
> IMO to link from the text.

How about changing it to just say that "initiator can send a dummy
message ...".

And the dummy message is not necessarely only those ones described in
the RFC4303 section 2.6, it can be anything that is suitable for the
scenario.

For example in the vpn setup where SA is set up during the autostart
it can be simple ping packet or it can be just udp packet discard port
whether is suitable for the environment.

This text is not describing what the dummy packet is, it is just
saying you might want to (and can) send such packet to make sure other
end knows you have the Child SA installed properly, so they can start
sending packets back.

I do not think we really need to change anything in this text.

> Issue #155 - SHOULD send triggering packet and interoperability
> ===============================================================
> In the sectioon 2.9 the "SHOULD" requirement was removed for the
> very specific traffic selector as fist traffic selector.  
> ...
> I agree with Tero here. I think the SHOULD should come back.

I (still) agree with myself and Yoav :-)

> Issue #156 - SHOULD generate and accept which types?
> ====================================================
> Section 3.5 lists a bunch of ID types (ID_IPV4_ADDR, ID_FQDN,
> ID_RFC822_ADDR, ID_IPV6_ADDR, ID_DER_ASN1_DN, ID_DER_ASN1_GN, and
> ID_KEY_ID), and then says:  
> 
> Two implementations will interoperate only if each can generate a
> type of ID acceptable to the other. To assure maximum
> interoperability, implementations MUST be configurable to send at
> least one of ID_IPV4_ADDR, ID_FQDN, ID_RFC822_ADDR, or ID_KEY_ID,
> and MUST be configurable to accept all of these types.
> Implementations SHOULD be capable of generating and accepting all of
> these types. IPv6-capable implementations MUST additionally be
> configurable to accept ID_IPV6_ADDR. IPv6-only implementations MAY
> be configurable to send only ID_IPV6_ADDR.  
> 
> What does " Implementations SHOULD be capable of generating and
> accepting all of these types" mean? It can't mean the four just
> listed, because that list of four comes with MUSTs.

I think it means the four just listed. Note, that only one of them is
MUST to send, all of them is MUST to accept. So the "SHOULD be capable
of generating" is saying that also the other four should be somethint
that can be configured to be sent. The next part "and accepting" is
not really needed as it is already covered by the MUST before.

> If it means all the listed types, the sentence should be changed to
> "Implementations SHOULD also be capable of generating ID_IPV6_ADDR,
> ID_DER_ASN1_DN, and ID_DER_ASN1_GN."
> 
> 
> Unlike the other issues in this mail, this one generated a lively
> debate, that quickly went to requirements for PKIX. Valery made a
> (to mind mind valid) point that the requirements in section 4
> specify certificates with RSA keys, where other algorithms are
> available: GOST, DSA and ECDSA. While this is a valid point,
> criticism of section 4 should be in another issue, so I suggest
> going with Pasi's recommendation, and keeping the text as is.

I agree that better keep the text as it is now.

> Issue #157 - Illustrate the SA payload with a diagram
> =====================================================
> The text in 3.3 requires "peace of mind" to fully appreciate. A
> diagram might be helpful.  
> 
> "The margin is too narrow for a diagram" (Trac munges my diagram and
> will not take attachments). Will be sent separately to the list. 
> 
> Everybody likes illustrations. Yaron made one, Tero improved on
> this, and several people commented, for a total of 11 messages to
> the list.  The final version is Tero's, which kind of looks cramped,
> but I think should be added. (what ever happened to that draft about
> adding graphics to RFCs?) 
> 
>                           SA Payload
>                               |
>            +------------------+---------------------------+
>            |                                              |
>            |                                              |
>        Proposal #1                                    Proposal #2
>    Proto ID = ESP (3)                             Proto ID = ESP (3)
>      SPI size = 4                                   SPI size = 4
>      7 transforms                                   4 transforms
>    SPI = 0x95903423                               SPI = 0x12345678
>            |                                              |
>   +------+-+----+------+------+------+------+      +------+------+------+
>   |      |      |      |      |      |      |      |      |      |      |
>  Trans  Trans  Trans  Trans  Trans  Trans  Trans  Trans  Trans  Trans  Trans
>  form   form   form   form   form   form   form   form   form   form   form
>  ENCR   INTEG  ENCR   INTEG  ENCR    ESN   ESN    ENCR   ESN    ENCR   ESN
>  ENCR   AUTH   ENCR   AUTH   ENCR    No    Use    AES-   No     AES-   Use
>  _AES   _HMAC  _AES   _AES   _AES    ESN   ESN    GCM    ESN    GCM    ESN
>  _CBC   _SHA1  _CBC   _XCBC  _CBC     0     1     w/8     0     w/8     1
>    |    _96      |    _96      |                  octet         octet
>    |             |             |                  ICV           ICV
>    |             |             |                   |             |
>    |             |             |                   |             |
> Attribute     Attribute     Attribute           Attribute     Attribute
> Key Length    Key Length    Key Length          Key Length    Key Length
>    128           192           256                 128           256

I was not completely happy with the picture as the text in its gets so
narrow, so I was thinking what if we rotate it 90 degrees.

                                 +------------------+----------------+
                                 | Transform        | Attribute      |
                                 | Type = ENCR(1)   | Type =         |
                               +-+ ID =             |  Key length(14)|
                               | |  ENCR_AES_CBC(12)| Value = 128    |
                               | +------------------+----------------+
                               | | Transform        | Attribute      |
                               | | Type = ENCR(1)   | Type =         |
                               +-+ ID =             |  Key length(14)|
                               | |  ENCR_AES_CBC(12)| Value = 192    |
                               | +------------------+----------------+
                               | | Transform        | Attribute      |
                               | | Type = ENCR(1)   | Type =         |
              +--------------+ +-+ ID =             |  Key length(14)|
              | Proposal #1  | | |  ENCR_AES_CBC(12)| Value = 256    |
              | Protocol ID  | | +------------------+----------------+
            +-+    = ESP (3) + | | Transform        |
            | | SPI size = 4 |-+-+ Type = INTEG(3)  |
            | | 7 transforms | + | ID = AUTH_HMAC_  |
            | | SPI =        | | |       SHA1_96(2) |
            | |   0x95903423 | | +------------------+
            | +--------------+ | | Transform        |
            |                  +-+ Type = INTEG(3)  |
            |                  | | ID = AUTH_AES_   |
            |                  | |       XCBC_96(5) |
            |                  | +------------------+
            |                  | | Transform        |
            |                  +-+ Type = ESN (5)   |
            |                  | | ID = No ESN (0)  |
            |                  | +------------------+
            |                  | | Transform        |
            |                  +-+ Type = ESN (5)   |
+---------+ |                    | ID = ESN (1)     |
| SA      +-+                    +------------------+
| Payload | |                    +------------------+
+---------+ |                    | Transform        |
            |                  +-+ Type = ESN (5)   |
            |                  | | ID = No ESN (0)  |
            |                  | +------------------+
            |                  | | Transform        |
            |                  +-+ Type = ESN (5)   |
            |                  | | ID = ESN (1)     |
            | +--------------+ | +------------------+----------------+
            | | Proposal #1  | | | Transform        | Attribute      |
            | | Protocol ID  | | | Type = ENCR(1)   | Type =         |
            +-+    = ESP (3) +-+-+ ID = AES-GCM w/  |  Key length(14)|
              | SPI size = 4 | | |  8 octet ICV(18) | Value = 128    |
              | 7 transforms | | +------------------+----------------+
              | SPI =        | | | Transform        | Attribute      |
              |   0x12345678 | | | Type = ENCR(1)   | Type =         |
              +--------------+ +-+ ID = AES-GCM w/  |  Key length(14)|
                                 |  8 octet ICV(18) | Value = 256    |
                                 +------------------+----------------+

But that still gets too long to fit for one page, so better to keep my
previous picture.
-- 
kivi...@iki.fi
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to