Hi Valery,

Thank you very much for your review.

We agree with all these issues you pointed out, and we'll address them in the 
next version.

Regards & Thanks!
Wei PAN (潘伟)

    > -----Original Message-----
    > From: IPsec <ipsec-boun...@ietf.org> On Behalf Of Valery Smyslov
    > Sent: Friday, May 3, 2024 8:51 PM
    > To: ipsec@ietf.org
    > Subject: [IPsec] Review of draft-ietf-ipsecme-ikev2-sa-ts-payloads-opt
    > 
    > Hi,
    > 
    > I reviewed draft-ietf-ipsecme-ikev2-sa-ts-payloads-opt.
    > The document is in a good shape, however it has some issues that need
    > to be fixed.
    > 
    > 1. Section 3.
    > 
    >    To indicate support for the optimized rekey negotiation, the
    >    initiator includes the OPTIMIZED_REKEY_SUPPORTED notify payload
    > in
    >    the IKE_AUTH exchange request.  If multiple IKE_AUTH exchanges
    > are
    >    sent, the OPTIMIZED_REKEY_SUPPORTED notify payload should be in
    > the
    >    last IKE_AUTH exchange, which is the exchange that also contains the
    >    TS payloads.
    > 
    > This is not correct, If multiple IKE_AUTH exchanges take place, then TS
    > payloads are in the very _first_ IKE_AUTH request and in the very _last_
    > IKE_AUTH response. See Section 2.16 of RFC 7296, Section 4 of RFC 6467
    > and Section 2 of RFC 4739.
    > 
    > 2. Section 6.2
    > 
    >    The Critical bit MUST be 1.  A value of 0 MUST be ignored.
    > 
    > This is wrong. The Critical bit refers to the Payload Type and not to the
    > payload content.
    > In this case the type of payload is Notify Payload, that was defined in 
RFC
    > 7296.
    > And all payloads types defined in RFC 7296 must not have the Critical bit
    > set.
    > 
    > 3. Section 6.1.
    > 
    >    The Critical bit MUST be 0.  A non-zero value MUST be ignored.
    > 
    > While this is correct, the requirement is already present in RFC 7296
    > (Section 3.2), and I see no need to repeat it here. This is a generic 
rule of
    > payload processing in IKEv2 and the optimized rekey extension doesn't
    > change it, so no need to repeat.
    > 
    > 4. Section 6.2
    > 
    > The format of the OPTIMIZED_REKEY notification makes use of Protocol
    > ID, SPI Size and SPI fields of the Notify Payload to specify SPI of the 
new
    > (not yet created) SA. This use contradicts RFC 7296.
    > Section 3.10 of RFC 7296 says:
    > 
    >    o  Protocol ID (1 octet) - If this notification concerns an existing
    >       SA whose SPI is given in the SPI field, this field indicates the
    >       type of that SA.
    > 
    > Note, that these fields are concerned with _existing_ SA, which is not the
    > case for the OPTIMIZED_REKEY notification.
    > I propose to leave SPI fields empty, set both Protocol ID and SPI Size to
    > zero and move the SPI for the new SA to the Notification Data.
    > Note, that there is no ambiguity as to what protocol (AH or ESP) this
    > new SPI should be used with, since the REKEY_SA notification contains
    > this information.
    > 
    > Regards,
    > Valery.
    > 
    > 
    > 
    > _______________________________________________
    > IPsec mailing list
    > IPsec@ietf.org
    > https://www.ietf.org/mailman/listinfo/ipsec
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to