[Last-Call] Re: Secdir last call review of draft-ietf-ipsecme-g-ikev2-17

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Valery:

>> I find the use of GIKE_REKEY and GSA_REKEY a little bit confusing.
>> I think it would help the reader if these were discussed a bit in the Introduction.
> 
> GSA_REKEY is an type of G-IKEv2 (pseudo) exchange, it appears in the G-IKEv2 Header (Exchange Type field).
> The GIKE_REKEY is a protocol name, it appears in the GSA (and also in SAg) payload.

I think I figured it out, but I had to go back to do so.  I suspect other readers will need the hint too.

>> Figure 1 introduces GSA_REKEY, so perhaps, shortly after that a brife explanation
>> og GIKE_REKEY can be included.
> 
> I don't think this is the right place, as Figure 1 only depicts exchanges.
> Protocols are used in the SAg and GSA payloads
> to indicate for which protocol the proposal/policy is.
> 
> I'm not sure where to put more text about GIKE_REKEY protocol.
> Perhaps, the text in 2.3.3 (first use of GIKE_REKEY) can be changed:
> 
> OLD:
>   Proposals for Rekey SA
>   (with protocol GIKE_REKEY) and for Data-Security (AH [RFC4302] and/or
>   ESP [RFC4303]) SAs may be included into SAg.  
> 
> NEW:
>   Proposals for Rekey SA and
>   for Data-Security (AH [RFC4302] and/or ESP [RFC4303]) SAs may be
>   included into SAg.  Proposals for Rekey SA are identified by a new
>   Protocol ID GIKE_REKEY <TBA by IANA>.  
> 
> Does this help? Are more clarifications needed?

This is an improvement.  Thanks.

>> Section 1.2: To my ears, KEK and KWK are the same thing.  Please add more
>> words sto make the distinction more clear.
> 
> I think we can make the definition of KEK more accurate:
> 
> OLD:
>   Key Encryption Key (KEK)
>      The symmetric cipher key used in a Rekey SA to protect
>      distribution of new keys.
> 
> NEW:
>   Key Encryption Key (KEK)
>      The symmetric key (or a set of keys) used in a Rekey SA to protect
>      its messages.
> 
> Is this better?

Yes, thanks.

>> Section 2:  Please move the last paragraph of Section 2.1 into this empty section.
>> Also, a few words about what this section is going to to cover would be helpful.
> 
> Done. Also moved there the first paragraph of Section 2.1, which serves
> as a brief description of G-IKEv2.

Thanks.

>> Section 2.1: It says: "G-IKEv2 is compatible with most IKEv2 extensions defined so
>> far."  This begs for a list of the ones that are not compatible.  The pointer to
>> Section 6 should appear right after this statement.
> 
> OK.
> 
>> Section 2.4.1.1: I am surprised that the "ICV is computed using the current KEK
>> keys".  Two things surprise me.  First, I think there is only one "current KEK" at a
>> time.  Second,  I expected the current authentication key to be used for the ICV
>> computation.
> 
> I changed:
> 
> s/current KEK keys/current KEK
> 
> First, "KEK keys" is a tautology, then the updated definition of KEK
> says now that it is a key or a set of keys (e.g. one for encryption, one for authentication),
> thus I think it is OK to use KEK for ICV computation.

That helps.  Does anything further need said for AEADs?

>> Section 2.4.2.1: The text talks about "GSA, KD, N and D" payloads.
>> However, Figure 11 does not show the use of a D payload.  Further, Sections 2.3.3
>> and 2.3.4 do not talk about the D payload.
> 
>> Section 2.4.2.2: The text talks about "GSA, KD, N and D" payloads.
>> However, Figure 11 does not show the use of a D payload.  Further, Sections 2.3.3
>> and 2.3.4 do not talk about the D payload.
> 
> Deletion of group SA is covered later in Section 2.4.3.
> To eliminate confusion I deleted mention of D payloads in registration or rekey exchanges.

Thanks.

>> Section 4.5.3.2: DSS public keys should be phased out, so I discourage the
>> inclusion of DSS in this document.
> 
> G-IKEv2 follows the same recommendations on using crypto algorithms as IKEv2,
> and this document is not the right place to change these recommendations.
> The current recommendations (RFC 8247) mark DSS as "SHOULD NOT".
> Until it is marked "MUST NOT" its use is still allowed and we have to 
> define format for DSS signatures.

Okay.  Not ideal at this point in time, but I understand.

>> Minor Concerns:
>> 
>> Section 4.5.4: Can the wrapped key be 94 bits?  It appears that the payload is a
>> number of octets, but no padding mechanism is described.
>> The text is unclear because it says: "These bits..."
> 
> I see no problem if it is 94 bits (although it would be weird).
> The payload is a whole number of octets, the padding mechanism doesn't matter.
> Thus, the GCKS can fill the key bits beyond the needed length up to the whole 
> (any, but most naturally - nearest) number of octets with any value (zeroes, ones, random).
> GMs will consume exactly the needed number of bits, the rest (padding) will be thrown away.

Yes, I know that 94 bots would be weird.  I would expect the padding mechanism to be important for interoperability.

>> Section 2.3.4: The 3third paragraph ends with: "Sender-ID values (see Section
>> 2.5)."  I think that it should be pointing to Section 2.5.1.
> 
> OK.
> 
>> Section 2.7: There is a missing ")".  After reading several times, I am not sure
>> where it belongs.
> 
> Fixed. It belongs to "(see Section 2.6)".

Okay.

>> Nits:
>> 
>> Section 2.3.4: s/otherwise - in tunnel/otherwise, SAs are created in tunnel/
>> Section 2.4.1.1: s/Messages Authentication/Message Authentication/
>> Section 2.6: s/this transform/the Anti-Replay Protection transform/
>> Section 3.3: s/the wrapped keys are sent over/over which wrapped keys are sent/
>> Section 4.3: I suggest a rewording of the last sentence:
>> 
>>   The Payload Type for SAg payloads is thirty-three (33), which is
>>   identical to the SA Payload Type.
>> Section 4.4.2: s/section 3.13.1/Section 3.13.1/
>> Section 4.4.2.2.2: s/at the time of GMs' registration/when the GM is registered/
>> Section 4.5.1: s/the keys in the bag are for/associated with the keys in the bag/
>> Section 4.5.3.2: s/section 4.1.2.7/Section 4.1.2.7/
>> Section 8.2.1: s/unless in/unless used with/
> 
> All fixed, thanks.
> 
> The proposed changes can be reviewed here:
> https://github.com/smyslov/G-IKEv2/pull/26
> 
>> Note:
>> 
>> I did not review the Appendix.
>> 
>> Optional payloads (for example: "[CERTREQ]") really confuse IDnits.
>> They appear to be references that are missing.  I'm not sure there is anything to be
>> done at this point, but you might be able to think of a way to handle it.
> 
> The presentation language for ISAKMP/IKEv1/IKEv2 exchanges is used since 1997,
> and IDnits keeps complaining about missing references. 
> 
> I think that the proper way to handle this issue is to update IDnits so, 
> that it can take xml as a source (as this is currently the only authoritative RFC source) 
> and then it would be easy for IDnits to ignore the content of figures.

I know.  That is why I do not offer a proposal for fixing the situation.

Russ

-- 
last-call mailing list -- last-call@xxxxxxxx
To unsubscribe send an email to last-call-leave@xxxxxxxx




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux