Mohamed Boucadair has entered the following ballot position for
draft-ietf-ipsecme-ikev2-qr-alt-08: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-qr-alt/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Hi Valery,

Thank you for the effort put into this specification.

Also, thanks to Luis M. Contreras for the OPSDIR review (his first review for
the opsdir team, BTW) and to Valery for engaging with Luis.

Please find some comments below:

# Guidance for those who will deploy

>From the perspective of those who will deploy, I found appendix useful…but
somehow late. Putting aside that appendix was not referenced in the document,
having an applicability section early in the document with a guidance when to
use this extension vs. RFC8784 would be my preferred approach.

# Guards against too frequent changes

For example, we do have

CURRENT:
   If a fresh PPK is available to both peers at the time when an IKE SA
   is active, peers MAY use this fresh PPK without creating a new IKE SA
   from scratch.

Is there some kind of timer used as a guard to protect against too frequent
changes?

# Preference policy

CURRENT:
   However, if the responder supports both specifications and is
   configured to use PPKs, it has to choose one to use, thus it MUST
   return either USE_PPK_INT or USE_PPK notification in the response,
   but not both.

Is there any provision for policy support here? Also, can we recommend a
default value here?

# Exemplify shortcomings and situations

It would be helpful to exemplify the shortcomings mentioned in:

CURRENT:
   Instead, it is supposed to be
   used in situations where the approach defined there has a significant
   shortcomings.

Likewise, do we have examples of situations mentioned in the following excerpt?

CURRENT:
   However, if the partners support both use PPKs in
   IKE_AUTH and this specification, then the latter MAY also be used in
   situations where using PPKs in IKE_AUTH suffices.

BTW, what is meant by “partners” mentioned in that text? Do we mean initiator
and responder?

# Terminology anchor

As I’m there, maybe consider adding the following (or similar) to Section 2:

NEW:
   This document uses the terms defined in [RFC7296].  In
   particular, readers should be familiar with the terms "initiator" and
   "responder" as used in that document.

Cheers,
Med



_______________________________________________
IPsec mailing list -- ipsec@ietf.org
To unsubscribe send an email to ipsec-le...@ietf.org

Reply via email to