Hi Valery, Thank you very much for your review.
We agree with all these issues you pointed out, and we'll address them in the next version. Regards & Thanks! Wei PAN (潘伟) > -----Original Message----- > From: IPsec <ipsec-boun...@ietf.org> On Behalf Of Valery Smyslov > Sent: Friday, May 3, 2024 8:51 PM > To: ipsec@ietf.org > Subject: [IPsec] Review of draft-ietf-ipsecme-ikev2-sa-ts-payloads-opt > > Hi, > > I reviewed draft-ietf-ipsecme-ikev2-sa-ts-payloads-opt. > The document is in a good shape, however it has some issues that need > to be fixed. > > 1. Section 3. > > To indicate support for the optimized rekey negotiation, the > initiator includes the OPTIMIZED_REKEY_SUPPORTED notify payload > in > the IKE_AUTH exchange request. If multiple IKE_AUTH exchanges > are > sent, the OPTIMIZED_REKEY_SUPPORTED notify payload should be in > the > last IKE_AUTH exchange, which is the exchange that also contains the > TS payloads. > > This is not correct, If multiple IKE_AUTH exchanges take place, then TS > payloads are in the very _first_ IKE_AUTH request and in the very _last_ > IKE_AUTH response. See Section 2.16 of RFC 7296, Section 4 of RFC 6467 > and Section 2 of RFC 4739. > > 2. Section 6.2 > > The Critical bit MUST be 1. A value of 0 MUST be ignored. > > This is wrong. The Critical bit refers to the Payload Type and not to the > payload content. > In this case the type of payload is Notify Payload, that was defined in RFC > 7296. > And all payloads types defined in RFC 7296 must not have the Critical bit > set. > > 3. Section 6.1. > > The Critical bit MUST be 0. A non-zero value MUST be ignored. > > While this is correct, the requirement is already present in RFC 7296 > (Section 3.2), and I see no need to repeat it here. This is a generic rule of > payload processing in IKEv2 and the optimized rekey extension doesn't > change it, so no need to repeat. > > 4. Section 6.2 > > The format of the OPTIMIZED_REKEY notification makes use of Protocol > ID, SPI Size and SPI fields of the Notify Payload to specify SPI of the new > (not yet created) SA. This use contradicts RFC 7296. > Section 3.10 of RFC 7296 says: > > o Protocol ID (1 octet) - If this notification concerns an existing > SA whose SPI is given in the SPI field, this field indicates the > type of that SA. > > Note, that these fields are concerned with _existing_ SA, which is not the > case for the OPTIMIZED_REKEY notification. > I propose to leave SPI fields empty, set both Protocol ID and SPI Size to > zero and move the SPI for the new SA to the Notification Data. > Note, that there is no ambiguity as to what protocol (AH or ESP) this > new SPI should be used with, since the REKEY_SA notification contains > this information. > > Regards, > Valery. > > > > _______________________________________________ > IPsec mailing list > IPsec@ietf.org > https://www.ietf.org/mailman/listinfo/ipsec _______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec