> On Apr 12, 2024, at 12:52 AM, Valery Smyslov <s...@elvis.ru> wrote: > > Hi Mahesh, > > please, see inline. > > HI Valery, > > Thanks for responding to my comments. > > Some of these comments are generated by a tool we use, and as it says, you > should feel free to ignore them if they are not applicable. Please see inline > for the remaining. > > >> On Apr 11, 2024, at 12:56 AM, Valery Smyslov <s...@elvis.ru >> <mailto:s...@elvis.ru>> wrote: >> >> Hi Mahesh, >> >> thank you for your comments, please see inline. >> >> >>> Mahesh Jethanandani has entered the following ballot position for >>> draft-ietf-ipsecme-ikev2-auth-announce-09: No Objection >>> >>> When responding, please keep the subject line intact and reply to all email >>> addresses included in the To and CC lines. (Feel free to cut this >>> introductory >>> paragraph, however.) >>> >>> >>> Please refer to >>> https://www.ietf.org/about/groups/iesg/statements/handling-ballot- >>> <https://www.ietf.org/about/groups/iesg/statements/handling-ballot-> >>> positions/ >>> for more information about how to handle DISCUSS and COMMENT positions. >>> >>> >>> The document, along with other ballot positions, can be found here: >>> https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-auth-announce/ >>> <https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-auth-announce/> >>> >>> >>> >>> ---------------------------------------------------------------------- >>> COMMENT: >>> ---------------------------------------------------------------------- >>> >>> Thanks to Reese Enghardt for the General Area Review Team (Gen-ART) review >>> to Rifaat for the SECDIR review, and to Marc for the ARTART review. >>> >>> Section 3.1, paragraph 14 >>> >>>> If the responder has sent any CERTREQ payload in the IKE_SA_INIT, >>>> then it MUST re-send the same payload(s) in the IKE_INTERMEDIATE >>>> response containing the SUPPORTED_AUTH_METHODS notification if any of >>>> the included Announcements has a non-zero Cert Link field (see >>>> Section 3.2.2 and Section 3.2.3). This requirement allows peers to >>>> have a list of Announcements and a list of CAs in the same message, >>>> which simplifies their linking (note, that this requirement is always >>>> fulfilled for the IKE_SA_INIT and IKE_AUTH exchanges). However, if >>>> for any reason the responder doesn't re-send CERTREQ payload(s) in >>>> the IKE_INTERMEDIATE exchange, then the initiator MUST NOT abort >>>> negotiation. Instead, the initiator MAY either link the >>>> Announcements to the CAs received in the IKE_SA_INIT response, or MAY >>>> ignore the Announcements containing links to CAs. >>> >>> I am a little puzzled by the MUST at the beginning of the paragraph which >>> insists that CERTREQ payload should be sent in IKE_INTERMEDIATE response >>> and >>> the MUST NOT/MAY at the bottom of the paragraph, which seems to be ok with >>> not >>> re-sending the CERTREQ payload. Is it possible that the CERTREQ payloads are >>> not re-send and at the same time they do not fit in IKE_SA_INIT (without >>> being >>> fragmented)? >> >> Good point, thank you. We can s/MUST/SHOULD. >> >> The idea is to make initiator's task of linking auth announcements to CAs >> simpler, >> by always having them in one message. On the other hand, responder may >> have its own considerations about re-sending CERTREQ in the IKE_INTERMEDIATE. >> >> >>> The IANA review of this document seems to not have concluded yet. >> >> Hmm, from my understanding, the IANA has already reviewed the draft... > > You are right. In most cases, IANA will take a look at the IANA > Considerations section, and say they understand the request. I on the other > hand, tend to err on the side of giving more information than less. For > example, in this case what does RFCXXXX refer to? A short note to the RFC > Editor (with another note to say please remove it before publication), would > inform them that RFCXXXX refers to the RFC number that will be assigned to > this document. > > Well, I see your point, but do you think that the current text would > confuse the IANA and the RFC Editor? > The current text is: > > This document defines a new Notify Message Type in the "IKEv2 Notify > Message Status Types" registry referencing this RFC: > > <TBA> SUPPORTED_AUTH_METHODS [RFCXXXX] > > > It seems to me that the current text is clear enough that RFCXXXX > is this RFC. > Do you think more instructions for the RFC Editor are needed?
The current text is fine. As you mention, IANA has already processed the request. Thanks. >> >> >>> No reference entries found for these items, which were mentioned in the >>> text: >>> [RFCXXXX]. >> >> I believe the RFC Editor will change XXXX this to the appropriate value. >> >> >>> Possible DOWNREF from this Standards Track doc to [IKEV2-IANA]. If so, the >>> IESG >>> needs to approve it. >> >> I think that referencing IANA registries is not a DOWNREF. > > This is an example of the tool trying to figure out where is the reference > (possibly because of the square brackets). You can ignore it. > > OK. >> >> >>> Found terminology that should be reviewed for inclusivity; see >>> https://www.rfc-editor.org/part2/#inclusive_language >>> <https://www.rfc-editor.org/part2/#inclusive_language> for background and >>> more >>> guidance: >>> >>> * Term "his"; alternatives might be "they", "them", "their" >> >> >> Paul Wouters is definitely "he" :-) > > Another case of the tool giving a false positive. But in general the idea is > to flag use of his, her etc. You get the picture. > > Sure. >> >> >>> ------------------------------------------------------------------------------- >>> NIT >>> ------------------------------------------------------------------------------- >>> >>> All comments below are about very minor potential issues that you may >>> choose to >>> address in some way - or ignore - as you see fit. Some were flagged by >>> automated tools (via https://github.com/larseggert/ietf-reviewtool >>> <https://github.com/larseggert/ietf-reviewtool>), so there >>> will likely be some false positives. There is no need to let me know what >>> you >>> did with these suggestions. >>> >>> Section 1, paragraph 3 >>> >>> s/each peer uses/each peer use/ >> >> I think the current text is correct. >> >> >>> Section 3, paragraph 1 >>> >>>> particular trust anchors. Upon receiving this information the peer >>>> may take it into consideration while selecting an algorithm for its >>>> authentication if several alternatives are available. >>> >>> This sentence does not parse for me. When it says, "the peer may take it >>> into >>> consideration while ...", I seem to be missing what needs to be taken into >>> consideration. >> >> Perhaps: >> >> NEW: >> >> The receiving party may take this information into consideration when >> selecting an algorithm for its >> authentication if several alternatives are available. >> >> Is this better? > > Yes, and thanks. > > All the comments following this are from the tool, so feel free to ignore. > > Some of them were useful, thank you. > > Regards, > Valery. >> >> >>> Section 3.2, paragraph 6 >>> >>>> If more authentication methods are defined in future, the >>>> corresponding documents must describe the semantics of the >>>> announcements for these methods. Implementations MUST ignore >>>> announcements which semantics they don't understand. >>> >>> s/announcements which semantics/announcements whose semantics/ >> >> OK. >> >> >>> Reference [RFC2409] to RFC2409, which was obsoleted by RFC4306 (this may be >>> on >>> purpose). >> >> On purpose. >> >> >>> Section 1, paragraph 2 >>> >>>> or implementations, especially if so called hybrid schemes are used (e.g. >>>> se >>>> ^^^^^^^^^ >>> The expression "so-called" is usually spelled with a hyphen. >> >> Fixed (caused by my native language experience - in Russian no hyphen is >> used in this case). >> >> >>> Section 3.1, paragraph 6 >>> >>>> E exchange, defined in [RFC9242] (i.e. the responder has received and is >>>> goin >>>> ^^ >>> It seems like there are too many consecutive spaces here. >> >> This is a result of xml2rfc conversion. There are no extra spaces in the xml. >> >> >>> Section 3.1, paragraph 8 >>> >>>> st to be sent in. This would allow to use IKE fragmentation [RFC7383] for >>>> lon >>>> ^^^^^^ >>> Did you mean "using"? Or maybe you should add a pronoun? In active voice, >>> "allow" + "to" takes an object, usually a pronoun. >> >> OK, s/to use/using >> >> >>> "I", paragraph 6 >>> >>>> field, and the Notify Message Type is set to <TBA by IANA>. The >>>> Notification >>>> ^^^^^^ >>> You have used the passive voice repeatedly in nearby sentences. To make your >>> writing clearer and easier to read, consider using active voice. >> >> Not that I disagree with you (and actually, as a non-native speaker, I >> really appreciate these comments), >> but in this case I'd rather leave it to the RFC Editor. >> >> >>> Section 3.2, paragraph 2 >>> >>>> uthentication methods are defined in future, the corresponding documents >>>> must >>>> ^^^^^^^^^ >>> The phrase "in future" is British English. Did you mean: "in the future"? >> >> Fixed (and I will try to remember this particular difference between British >> English and American English). >> >> >>> Section 3.2, paragraph 6 >>> >>>> ormat is used. This format allows to link the announcement with a >>>> particular >>>> ^^^^^^^ >>> Did you mean "linking"? Or maybe you should add a pronoun? In active voice, >>> "allow" + "to" takes an object, usually a pronoun. >> >> OK, s/to link/linking >> >> >>> Section 8.1, paragraph 5 >>> >>>> th-pq-composite-sigs-13>. Appendix A. Examples of Announcing Supported >>> Authe >>> >>>> ^^ >>> It seems like there are too many consecutive spaces here. >> >> It is xml2rfc which is at fault :-) >> >> >>> Section 8.2, paragraph 5 >>> >>>> 1), SIGNATURE(RSASSA-PSS:2), SIGNATURE(ECDSA:3)))} IKE_AUTH HDR, >>> SK {IDi, CE >>> >>>> ^ >>> It appears that a white space is missing. >> >> Not sure where it is missing... >> >> Regards, >> Valery. > > > > Mahesh Jethanandani > mjethanand...@gmail.com <mailto:mjethanand...@gmail.com> Mahesh Jethanandani mjethanand...@gmail.com
_______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec