On Jul 14, 2016, at 2:30 PM, Douglas Gash (dcmgash) <dcmg...@cisco.com> wrote:
> 
> Hello
> For information: 
> 
> Version 3 loaded last week has many revisions from the last round of
> comments.
> Version 4 loaded this week has some minor mods/clarifications on US-ASCII
> vs UTF-8.
> 
> Would appreciate any further reviews.

  Many of my review comments have been addressed, which is good.  There still 
remains a number of issues.

  The Security Considerations section is in the middle of the document, where 
it's typically at the end.  That's a minor nit.  The larger one is that the 
Security Considerations section is pretty minimal.  It should describe 
operational issues with the protocol, and comments as to what the security 
implications are for network management traffic to be sent in the clear.

  The issue with the field names remains.  I *suspect* the "user len" field 
contains the length of the "user" field... but there is nothing in the document 
which says so.

  The text still seems philosophical to me, instead of prescriptive.  For 
example in Section 3.6:

   After a packet body is decrypted, the lengths of the component values
   in the packet should be summed and checked against the cleartext
   datalength value from the header.  Any packets which fail this check
   should be discarded and an error signalled.

  The values "should" be summed?  Is that an RFC 2119 statement?  Or just a 
suggestion?  What happens if an implementation chooses to ignore this 
suggestion?

  And bad packets "should" be discarded?  Why not MUST?  How does an error get 
signalled?  What kind of error packet gets sent back?

  Perhaps something like this would be better:

   After a packet body is decrypted, the lengths of the component values
   in the packet are summed.  If the sum is not identical to the cleartext
   datalength value from the header,
   the packet MUST be discarded, and an error signalled.  The
   underlying TCP connection SHOULD also be closed.

  Which (for me) clarifies the operation, makes the checks normative, and adds 
a suggestion to close the TCP connection.  After all, if they key is wrong and 
packets can't be decrypted, there's no reason to keep the TCP connection open.  
You can't decrypt any data in the connection, so it will all be garbage.

  Alan DeKok.

_______________________________________________
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg

Reply via email to