I have read draft-ietf-ipsecme-iptfs before it was adopted, and during the
adoption call, but have been busy.  So I have read it again today from
beginning to end before tackling the long thread that has developed.

EXEC SUM: I think that the document is not ready.
     There are a lot of MAYs and future work thoughts on the sender.
     That's fine.  But, in order for future senders to know what's legal and
     what's not, what we really need is a clearly articulated Receiver State 
Machine.
     I suggest that this is pretty important.

===

The first sentence of the Abstract needs rework.
The words "security" and "confidentiality" are used, but really it's about
traffic analysis.  So, if there is anything with increased confidentiality,
it's the pattern, right?  Abstracts are really hard to write.
Ah, the problem is that "traffic flow security" is not the term,
it's traffic flow confidentiality, and it is not capitalized!
So, that would help, but... it's not defined yet.

I suggest the following terms be added to section 1.1.
 - TFC

* I'm glad you recommend PLMTUD, I suggest PMTUD is dead.
  How do use PLMTUD?  Will you tell us later in the document, or is that new 
work?
      (does not look like you tell us)

* You are using "CamelCase" for variables, I found that jarring.
  I wondered what rfc4303 used, but found nothing.
  RFC7296 uses UPPER_CASE.
  RFC7296 does not use _ for field names.
  I might prefer snake_case, but whatever...

* I would prefer "If BlockOffset != 0" rather than
    Conversely, if the "BlockOffset" value is non-zero it points to the


>   The "BlockOffset" can point past the end of the "DataBlocks" data
>   which indicates that the next data block occurs in a subsequent
>   encapsulating packet.

I guess, it the actual value does not matter: it's not remembered.
As long it is bigger than the packet, it's good.  So 0xffff probably works?

> 2.2.2.  No Implicit End Padding Required

-- I think you are telling me that the IPv4/IPv6 length field is good enough
   to find the end of the packet.  If not, I didn't quite understand.
   Later in 6.1, I learn that AGGFRAG_PAYLOADS are squatting on 'IPv5'
   I hope this will be acceptable :-)
   I think it's a reasonable hack, and I don't see us wrapping around
   IP versions within a hundred years, soooo...
   And pad blocks are "IPv0"

> This possible interleaving of all-pad
>    payloads allows the sender to always be able to send a tunnel packet,
>   regardless of the encapsulation computational requirements.

I think that you are telling me that a sender can have some pad packets being
created regularly (perhaps on a CPU dedicated to this) and almost ready to
send, and the pad packet is just replaced by real data if it happens to be
ready.

Please split 2.2.5 up by flag type into subsubsubsection.
2.4.21: Maybe need to briefly explain circuit breakers to us 
non-transport-types.

> If the SA back to the sender is a non-
>    AGGFRAG_PAYLOAD enabled SA then an AGGFRAG_PAYLOAD empty payload
>    (i.e., header only) is used to convey the information.

is this really worth supporting?
Please break up third paragraph.

=====







--
Michael Richardson <mcr+i...@sandelman.ca>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide




Attachment: signature.asc
Description: PGP signature

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to