Hi Andy,

thank you, please see inline.

> Andy Newton has entered the following ballot position for
> draft-ietf-ipsecme-ikev2-qr-alt-08: No Objection
> 
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
> 
> 
> Please refer to 
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-
> positions/
> for more information about how to handle DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-qr-alt/
> 
> 
> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> # Andy Newton, ART AD, comments for draft-ietf-ipsecme-ikev2-qr-alt-08
> CC @anewton1998
> 
> * line numbers:
>   -
>   
> https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-
> ipsecme-ikev2-qr-alt-08.txt&submitcheck=True
> 
> * comment syntax:
>   - https://github.com/mnot/ietf-comments/blob/main/format.md
> 
> * "Handling Ballot Positions":
>   - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/
> 
> ## Comments
> 
> Thanks for writing this draft. The following are just comments to use as you
> see fit.
> 
> ### Variable PKK_ID
> 
> Given the figure and the description of PKK_ID below, is there a mismatch
> on the length. The description says "(variable)" but the figure seems to
> indicate a rigid 8 octets.
> 
> 204                             1                   2                   3
> 205         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
> 206        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> 207        |                                                               |
> 208        ~                             PPK_ID                            ~
> 209        |                                                               |
> 210        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> 211        |                                                               |
> 212        +                        PPK Confirmation                       +
> 213        |                                                               |
> 214        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> 
> 216                 Figure 1: PPK_IDENTITY_KEY Notification Data Format
> 
> 218        Where:
> 
> 220        *  PPK_ID (variable) -- PPK_ID as defined in Section 5.1 of
> 221           [RFC8784].  The receiver can determine the length of PPK_ID by
> 222           subtracting 8 (the length of PPK Confirmation) from the
> 223           Notification Data length.
> 
> 225        *  PPK Confirmation (8 octets) -- value, which allows the responder
> 226           to check whether it has the same PPK as the initiator for a 
> given
> 227           PPK_ID.  This field contains the first 8 octets of a string
> 228           computed as prf( PPK, Ni | Nr | SPIi | SPIr ), where prf is the
> 229           negotiated PRF; PPK is the key value for a specified PPK_ID; Ni,
> 230           Nr, SPIi, SPIr -- nonces and IKE SPIs for the SA being
> 231           established.

Actually, while PPK_ID looks like occupying exactly 8 bytes on the figure, the 
side lines 
of the box around it have tildes (~) in the middle to indicate that the actual 
size can vary.

I do not know how to better indicate the variability of the field length on the 
figure.
If you have any ideas how to do it (preserving the clarity of the figure)
I'll be happy to use them.

> ## Nits
> 
> ### Remove "the one"
> 
> I think "the one" can be removed from the end of line 91. I would also remove
> the word "mostly", but that's just me.
> 
> 90         calculation.  At the time this extension was being developed, it 
> was
> 91         a consensus in the IPsecME WG that it is the IPsec traffic the one
> 92         that mostly needs to be protected.  It was believed that 
> information

This sentence has already been changed based on Gorry comments to:

   At the time this extension was being developed, the
   consensus in the IPsecME WG was that the IPsec traffic was more
   important to be protected than the IKE traffic.

> ### Not Applicable Cells
> 
> My first reaction to looking at this table is that "*" was a reference to
> a foot note or aside. Maybe putting "n/a" for "not applicable" is better
> if your intention is to say neither "Yes" nor "No" but something is needed.
> 
> 295        Table 1 summarizes the above logic for the responder:
> 
> 297
> +===========+=============+========+===========+=============
> =======+
> 298        |Received   | Supports    |Has one | PPK is    | Action            
>  |
> 299        |USE_PPK_INT| USE_PPK_INT |of      | mandatory |                   
>  |
> 300        |           |             |proposed| for       |                   
>  |
> 301        |           |             |PPKs    | initial   |                   
>  |
> 302        |           |             |        | IKE SA    |                   
>  |
> 303
> +===========+=============+========+===========+=============
> =======+
> 304        |No         | *           |*       | No        | [RFC8784] (if     
>  |
> 305        |           |             |        |           | proposed) or      
>  |
> 306        |           |             |        |           | standard IKEv2    
>  |
> 307        |           |             |        |           | protocol          
>  |
> 308        
> +-----------+-------------+--------+-----------+--------------------+
> 309        |No         | Yes         |*       | Yes       | Send              
>  |
> 310        |           |             |        |           | 
> NO_PROPOSAL_CHOSEN |
> 311        
> +-----------+-------------+--------+-----------+--------------------+
> 312        |Yes        | Yes         |Yes     | *         | Section 3.1,      
>  |
> 313        |           |             |        |           | Paragraph 16, 
> Item |
> 314        |           |             |        |           | 1 (use this       
>  |
> 315        |           |             |        |           | extension)        
>  |
> 316        
> +-----------+-------------+--------+-----------+--------------------+
> 317        |Yes        | Yes         |No      | Yes       | Section 3.1,      
>  |
> 318        |           |             |        |           | Paragraph 16, 
> Item |
> 319        |           |             |        |           | 2 (abort          
>  |
> 320        |           |             |        |           | negotiation)      
>  |
> 321        
> +-----------+-------------+--------+-----------+--------------------+
> 322        |Yes        | Yes         |No      | No        | Section 3.1,      
>  |
> 323        |           |             |        |           | Paragraph 16, 
> Item |
> 324        |           |             |        |           | 3 (standard IKEv2 
>  |
> 325        |           |             |        |           | protocol)         
>  |
> 326        
> +-----------+-------------+--------+-----------+--------------------+

Actually, "*" here means "Does not matter", and not "Not Applicable". 
The reason asterisks are used is that this document is closely related to RFC 
8784 
(in fact, it was developed to overcome the RFC 8784 limitations) and RFC 8784 
has an identical table (modulo slightly different conditions)
where asterisk are used. We inherited its syntax here,
since nobody complained before. I'd rather to keep asterisks here unless 
you strongly prefer something else (and "Does not matter" is a bit long to fit 
into cells,
so something different is needed).

> ### Comparison to IKE_AUTH
> 
> 457        IKEv2 protocol are discussed in [RFC8784].  Compared to use PPKs in
> 458        IKE_AUTH this specification makes even initial IKE SA quantum 
> secure.
> 
> Just a suggestion (if I understood correct):
> 
>    Unlike PPKs in IKE_AUTH, this specification makes initial IKE SA quantum
>    secure.

Your understanding is correct.

Perhaps (to emphasize that it is initial IKE SA that is not quantum secure in 
RFC 8784
and we make it such here):

    Unlike using PPKs in IKE_AUTH, this specification makes even initial IKE SA 
quantum
    secure.

If you are OK with this, I'll make the change.

Regards,
Valery.

_______________________________________________
IPsec mailing list -- ipsec@ietf.org
To unsubscribe send an email to ipsec-le...@ietf.org

Reply via email to