Thanks, Med.

I requested the IETF LC.

-Ben

On Wed, Oct 21, 2020 at 08:31:04AM +0000, mohamed.boucad...@orange.com wrote:
> Hi Ben, 
> 
> Thank you for the review.
> 
> An updated version is available at: 
> https://tools.ietf.org/html/draft-ietf-ipsecme-ipv6-ipv4-codes-05.  
> 
> Please see inline. 
> 
> Cheers,
> Med
> 
> > -----Message d'origine-----
> > De : Benjamin Kaduk [mailto:ka...@mit.edu]
> > Envoyé : mardi 20 octobre 2020 21:56
> > À : draft-ietf-ipsecme-ipv6-ipv4-codes....@ietf.org
> > Cc : ipsec@ietf.org
> > Objet : AD review of draft-ietf-ipsecme-ipv6-ipv4-codes-04
> > 
> > Hi Med,
> > 
> > Not a whole lot to comment on here, but probably we should publish a
> > new revisionn to tidy things up before asking for IETF LC.
> > 
> > Thanks,
> > 
> > Ben
> > 
> > %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
> > %
> > 
> > We use the term "dual-stack" several times but it is not defined
> > explicitly.  While this is certainly a common and fairly well-known
> > concept, perhaps we should drop an "IPv6/IPv4" in somewhere (or add
> > a reference?  I'm not sure what reference would be good, offhand).
> 
> [Med] Added text to explain this. 
> 
> > 
> > There seem to be a few places where we use the phrase "status type"
> > without preceding "notification"; would it make sense to normalize
> > the language around "notification status type"?
> 
> [Med] Agree. Fixed. 
> 
> > 
> > Section 3
> > 
> >    Section 3.15.4 of [RFC7296] defines a generic notification error
> > type
> >    that is related to a failure to handle an address assignment
> > request.
> >    That error type does not explicitly allow an initiator to
> > determine
> >    why a given address family is not assigned, nor whether it should
> > try
> >    using another address family.  INTERNAL_ADDRESS_FAILURE is a
> > catch-
> >    all error type when an address-related issue is encountered by an
> >    IKEv2 responder.
> > 
> >    INTERNAL_ADDRESS_FAILURE does not provide sufficient hints to the
> >    IKEv2 initiator to adjust its behavior.
> > 
> > I feel like we might also want to mention that (per 7296), "[t]he
> > responder sends INTERNAL_ADDRESS_FAILURE only if no addresses can be
> > assigned", and in many of the indicated use cases, the responder can
> > successfully assign *one* address, just not the full requested set,
> > so INTERNAL_ADDRESS_FAILURE is explicitly not useful.
> > 
> 
> [Med] Tweaked that part to include the text you quoted. The explanation text 
> covers this case as well.
> 
> > Section 5
> > 
> >    If the initiator is dual-stack, it MUST include both address
> > families
> >    in its request (absent explicit policy/configuration otherwise).
> > 
> > By "both address families" we mean "both the IP6_ALLOWED and
> > IP4_ALLOWED notification status types"?  Or are we talking about
> > something else, like a configuration payload?
> 
> [Med] This is typically INTERNAL_IP4_ADDRESS and INTERNAL_IP6_ADDRESS 
> attributes. The attributes are not listed as I would like to cover (the 
> experimental attribute) INTERNAL_IP6_PREFIX (or future attributes to achieve 
> the same functionality).
> 
> Updated the text to point to Section 3.15 of 7296.  
> 
> > 
> > It is perhaps surprising that we only impose the requirement for the
> > initiator to send these notifications specifically on dual-stack
> > initiators; a generic protocol update might typically impose a
> > requirement to always send your capabilities, whether dual-stack or
> > single-stack.
> 
> [Med] These notifications are not sent by the initiator. The default 
> behaviour for a dual-stack initiator is to request both IPv4 and IPv6 
> connectivity. This behaviour can be restricted by policy. In such case, the 
> initiator will only request the connectivity that adheres to its local policy 
> (e.g., IPv6-only).
> 
>   In particular, the table seems to imply that the
> > initiator will still send something to indicate the requested AF in
> > the single-requested-AF case (which need not be dual-stack); is this
> > something other than IP<N>_ALLOWED?
> 
> [Med] Yes. This is inferred from the INTERNAL_* attributes listed above. 
> Added NEW text to make this clear. 
> 
> > 
> >    If the initiator only receives one single notification
> > IP4_ALLOWED or
> >    IP6_ALLOWED from the responder, the initiator MUST NOT send a
> > request
> >    for an alternate address family not supported by the responder.
> > 
> > What is the scope of this "MUST NOT"?  Other CREATE_CHILD_SA on the
> > same parent IKE SA?
> 
> [Med] Yes. Made this change: s/request/subsequent request. 
> 
>   Ever to the same responder?
> > 
> >    If a dual-stack initiator requests only an IPv6 prefix (or an
> > IPv4
> >    address) but only receives IP4_ALLOWED (or IP6_ALLOWED)
> > notification
> >    status type from the responder, the initiator MUST send a request
> > for
> >    IPv4 address(es) (or IPv6 prefix(es)).
> > 
> > [related to the earlier comment about only requiring dual-stack
> > initiators to send, at the start of the section we said that a dual-
> > stack initiator MUST include both address families...]
> 
> [Med] This is about covering the case where a policy is provided and the 
> default behaviour is not followed. 
> 
> > 
> > Section 6
> > 
> > I think a phrasing like "since the IPv4/IPv6 capabilities of a node
> > are readily determined from the traffic it generates, this document
> > does not introduce any new security considerations compared to the
> > ones described in [RFC7296], which continue to apply" might be more
> > conventional.  (I don't object to the current phrasing, though.)
> 
> [Med] I prefer yours. Fixed. Thanks. 
> 
> 
> _________________________________________________________________________________________________________________________
> 
> Ce message et ses pieces jointes peuvent contenir des informations 
> confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu 
> ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
> electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou 
> falsifie. Merci.
> 
> This message and its attachments may contain confidential or privileged 
> information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and delete 
> this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been 
> modified, changed or falsified.
> Thank you.
> 

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to