Hi Valery,

Yes, the suggested text looks good to me.

Thanks,
 Rifaat


On Thu, Aug 4, 2022 at 10:00 AM Valery Smyslov <s...@elvis.ru> wrote:

> Hi Rifaat,
>
> thank you for your review.
>
> > Reviewer: Rifaat Shekh-Yusef
> > Review result: Ready
> >
> > I have reviewed this document as part of the security directorate's
> > ongoing effort to review all IETF documents being processed by the
> > IESG.  These comments were written primarily for the benefit of the
> > security area directors.  Document editors and WG chairs should treat
> > these comments just like any other last call comments.
> >
> > The summary of the review is: Ready with one comment
> >
> > The security considerations section describes two potential recovery
> mechanisms
> > to an injection attack. The first option is to close the TCP connection
> and let
> > the originator recreate it. The second option is a re-sync mechanism.
> The way I
> > read the document, it seems that the first option is the recommended
> one, but
> > it is not clear to me when should the second option be used, if at all.
> It
> > would be great if some text be added to clarify this.
>
> Yes, the first option is preferred, since it is simple and provides
> deterministic result.
> The drawback of the first option is that the performance will degrade
> (current TCP connection
> should be closed, then the TCP originator will detect it and create a new
> TCP connection,
> that will slow start etc.)
>
> The second option is an alternative approach that implementations may try
> to use
> to avoid performance degradation. However, this approach is unreliable,
> especially in situation when attacker injects garbage and the TCP responder
> will waste resources trying to find the next valid packet which doesn't
> exist.
> For this reason this option is MAY.
>
> We can change the beginning of this this para as follows:
>
>    To avoid performance degradation caused by closing and re-creating TCP
> connection,
>    implementations MAY alternatively try to re-sync after they receive
>    unknown SPIs by searching the TCP stream for a 64-bit binary vector ...
>
> Is it OK?
>
> Regards,
> Valery.
>
>
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to