Re: [IPsec] Labeled IPsec options

2019-12-13 Thread Valery Smyslov
Hi Paul, > > I don't think option 4 is a good idea. If old responder encounters an > > unknown payload with Critical bit set in IKE_AUTH, it will return back > > UNSUPPORTED_CRITICAL_PAYLOAD and IKE SA won't be set up. > > See section 2.21.2 of RFC7296. This would require initiator to retry > > fr

Re: [IPsec] Labeled IPsec options

2019-12-13 Thread Paul Wouters
On Fri, 13 Dec 2019, Valery Smyslov wrote: I don't think that matters. Security labels are never optional but always mandatory. And it seems very unlikely to have a mix of child sa's with and without label. So they will all have a label, and then failing the IKE SA is fine, Do you want to say

Re: [IPsec] Labeled IPsec options

2019-12-13 Thread Paul Wouters
On Fri, 13 Dec 2019, Hu, Jun (Nokia - US/Mountain View) wrote: If you select multiple TS's these all become part of one Child SA. So I think the granularity of the label does not change between the solutions? [Hu Jun] if we agree that label is per CHILD_SA, then with option 1 or 2, there is

Re: [IPsec] Labeled IPsec options

2019-12-13 Thread Paul Wouters
On Thu, 12 Dec 2019, Russ Housley wrote: If the initiator wants to use labels but the responder does not support labels, will the initiator move forward anyway? Doing so would seem surprising to me. The point of the label is to indicate what handling is needed to adequately protect the data.

Re: [IPsec] Labeled IPsec options

2019-12-13 Thread Valery Smyslov
> >> I don't think that matters. Security labels are never optional but > >> always mandatory. And it seems very unlikely to have a mix of child > >> sa's with and without label. So they will all have a label, and then > >> failing the IKE SA is fine, > > > > Do you want to say, that it's impossib

Re: [IPsec] Labeled IPsec options

2019-12-13 Thread Paul Wouters
On Fri, 13 Dec 2019, Valery Smyslov wrote: I don't think that matters. Security labels are never optional but always mandatory. And it seems very unlikely to have a mix of child sa's with and without label. So they will all have a label, and then failing the IKE SA is fine, Do you want to say

Re: [IPsec] Labeled IPsec options

2019-12-13 Thread Valery Smyslov
Hi Tero, > > You can solve the problem of imperfect error handling by adding a new > > SECLABES_SUPPORTED notification, that must be exchanged in > > IKE_SA_INIT. If both peers support seclabels, then the responder must > > not ignore seclabel notifications in IKE_AUTH and CREATE_CHILD_SA. The > >

[IPsec] Genart last call review of draft-ietf-ipsecme-qr-ikev2-09

2019-12-13 Thread Christer Holmberg via Datatracker
Reviewer: Christer Holmberg Review result: Almost Ready I am the assigned Gen-ART reviewer for this draft. The General Area Review Team (Gen-ART) reviews all IETF documents being processed by the IESG for the IETF Chair. Please treat these comments just like any other last call comments. For mor

Re: [IPsec] [Last-Call] Last Call: (Postquantum Preshared Keys for IKEv2) to Proposed Standard

2019-12-13 Thread Paul Wouters
On Wed, 11 Dec 2019, Salz, Rich wrote: A much better title would be "Mixing Preshared Keys in IKEv2 for Postquantum Resistance". That's better. I misunderstood the document as both you and David Mcgrew kindly explained. I withdraw my concerns and hope the title is changed. I am fine wi