On Tue, 11 Jan 2022, Valery Smyslov wrote:

This sort of construction invites ambiguity if there is ever some other
future exchange that wants to go between IKE_SA_INIT and IKE_AUTH.  This
seems like a strong argument in support of the approach this draft
takes, i.e., make IKE_INTERMEDIATE fully generic, so as to minimize the
chance of needing such an additional future exchange.  That said, it
might be possible to slightly improve the future-proofing if we included
an indicator of what the "next content" after MACedIDFor[IR] is, such as
the one-octet encoding of the exchange type.  (I think it would have to
be part of IntAuth_N, not IntAuth itself.)  I don't have a great sense
for whether the value this adds would be worth the disruption to
existing implementations, though.

I think this makes sense, and I would be okay with such a change.

If the WG thinks that it's worth to do this modification, then
we may also consider addressing the following issue,
raised past WGLC by Tobias Brunner:
https://mailarchive.ietf.org/arch/msg/ipsec/8kM6GoPeJwjuoxSH4CL4B75ZJMk/

The WG reaction at that time was that the issue is minor and
no modification is needed, but _if_ we decide to incorporate
Ben's modification, then we can address this issue too.

I'm not sure this is needed. Implementations will anyway limit the
number of IKE_INTERMEDIATE exchanges they are willing to accept to
some reasonably very low number. Although if others want this, I
won't object.

And even if we decide to leave it out, some words should be added to
Security Considerations section anyway, I'll do it.

That makes sense.

Paul

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to