I'm going to make some inquiries (to authors and NIST), like Valery, this
looks very strange.  If one or the other is correct, I'm going to pick
that...

Stay tuned.

Deb

On Fri, Sep 26, 2025 at 9:48 AM Madison Church <[email protected]>
wrote:

> Hi Valery and Brian, *Debbie,
>
> Thank you both for your replies and patience as we incorporate your
> requested changes! We have updated the document and have a few followup
> questions/comments inline (for easy readability, we have only included
> outstanding questions in this thread).
>
> *Debbie - As responsible AD for this document, please see question 14 and
> let us know if you approve the change made to the first sentence in Section
> 2.5. The change may be viewed in this diff file:
> https://www.rfc-editor.org/authors/rfc9838-diff.html.
>
> >>> 4) <!-- [rfced] Please review whether any of the notes in this document
> >>> should be in the <aside> element. It is defined as "a container for
> >>> content that is semantically less important or tangential to the
> >>> content that surrounds it" (
> https://authors.ietf.org/en/rfcxml-vocabulary#aside).
> >>> -->
> >>
> >> I'm not sure I understand the visual effect of <aside> element (I guess
> this is an xml2rfc v3 feature).
> >> Can you point me to RFCs that use this element?
> >>
> >> And do you have some parts of this document in mind that
> >> this element can be useful for?
>
> 1) Depending on author preference, we will occasionally use <aside> for
> text marked as "Note:". The output yields a visual of indented text with a
> vertical line on the left. For example, RFCs 9800 [1] and 9801 [2] utilize
> the <aside> element frequently.
>
> As for areas in this document that may benefit from the <aside>, the last
> sentence of Section 1 (Introduction and Overview) contains a note.
>
> [1]: https://www.rfc-editor.org/rfc/rfc9800.txt
> [2]: https://www.rfc-editor.org/rfc/rfc9801.txt
>
> >>> 14) <!-- [rfced] We have updated this sentence to use "AES CCM" (per
> >>> RFC 4309) rather than "AES-CCM". Please let us know any
> >>> objections.
> >>>
> >>> Original:
> >>>   Several counter-based modes of operation have been specified for ESP
> >>>   (e.g., AES-CTR [RFC3686], AES-GCM [RFC4106], AES-CCM [RFC4309],
> >>>   ChaCha20-Poly1305 [RFC7634], AES-GMAC [RFC4543]) and AH (e.g., AES-
> >>>   GMAC [RFC4543]).
> >>>
> >>> Current:
> >>>   Several counter-based modes of operation have been specified for ESP
> >>>   (e.g., AES-CTR [RFC3686], AES-GCM [RFC4106], AES CCM [RFC4309],
> >>>   ChaCha20-Poly1305 [RFC7634], and AES-GMAC [RFC4543]) and AH (e.g.,
> AES-
> >>>   GMAC [RFC4543]).
> >>> -->
> >>
> >> Hmm, obviously, I should have no objections to this as RFC 4309 uses
> this form
> >> but actually this is a big surprise for me: the lack of consistency in
> naming :-)
> >>
> >> And a number of RFCs related to IPsec (I suspect there are others too)
> actually use "AES-CCM" form
> >> (RFC8247, RFC7321). Thus, I have no position and rely on AD's decision
> on this.
> >>
> >>> 22) <!-- [rfced] May we restructure the text below as follows for
> readability?
> >>>
> >>> Current:
> >>>   This transform ID defines the following properties.  Sequence numbers
> >>>   are 32-bit in size and are transmitted in the Sequence Number field
> of AH and
> >>>   ESP packets.  The value of sequence numbers is not guaranteed to be
> unique for
> >>>   the duration of an SA, thus they are not suitable for replay
> protection.  This
> >>>   transform ID MUST be used by the GCKS in case of multi-sender
> multicast
> >>>   Data-Security SAs utilizing protocols ESP or AH to inform the GMs
> that the
> >>>   replay protection is not expected to be possible.  The GCKS MAY also
> use this
> >>>   transform ID for single-sender multicast Data-Security SAs if replay
> >>>   protection is not needed (e.g. it is done on application level).
> >>>
> >>>
> >>> Perhaps:
> >>>   This transform ID defines the following properties:
> >>>
> >>>   * Sequence numbers are 32 bits in size and are transmitted in the
> Sequence
> >>>     Number field of AH and ESP packets.
> >>>
> >>>   * The value of sequence numbers is not guaranteed to be unique for
> >>>     the duration of an SA, thus they are not suitable for replay
> >>>     protection.
> >>>
> >>>   * This transform ID MUST be used by the GCKS in the case of
> multi-sender
> >>>     multicast Data-Security SAs utilizing protocols ESP or AH to inform
> >>>     the GMs that the replay protection is not expected to be possible.
> >>>
> >>>   * The GCKS MAY also use this transform ID for single-sender multicast
> >>>     Data-Security SAs if replay protection is not needed (e.g., it is
> done
> >>>     on the application level).
> >>> -->
> >>
> >> Actually, only two first bullet define the properties, the last two
> >> just explain how to use this transform ID. I propose instead the
> following
> >> variants.
> >>
> >> Option A - split para and do not add list:
> >>
> >> NEW (Option A):
> >>   This transform ID defines the
> >>   following properties.  Sequence numbers are 32 bits in size and are
> >>   transmitted in the Sequence Number field of AH and ESP packets.  The
> >>   value of sequence numbers is not guaranteed to be unique for the
> >>   duration of an SA, thus they are not suitable for replay protection.
> >>
> >>   This transform ID MUST be used by the GCKS in case of multi-sender
> >>   multicast Data-Security SAs utilizing protocols ESP or AH to inform
> >>   the GMs that the replay protection is not expected to be possible.
> >>   The GCKS MAY also use this transform ID for single-sender multicast
> >>   Data-Security SAs if replay protection is not needed (e.g., it is
> >>   done on the application level).
> >>
> >> Option B - use list for properties only:
> >>
> >> NEW (Option B):
> >>    This transform ID defines the following properties:
> >>
> >>    * Sequence numbers are 32 bits in size and are transmitted in the
> Sequence
> >>      Number field of AH and ESP packets.
> >>
> >>    * The value of sequence numbers is not guaranteed to be unique for
> >>      the duration of an SA, thus they are not suitable for replay
> >>      protection.
> >>
> >>   This transform ID MUST be used by the GCKS in case of multi-sender
> >>   multicast Data-Security SAs utilizing protocols ESP or AH to inform
> >>   the GMs that the replay protection is not expected to be possible.
> >>   The GCKS MAY also use this transform ID for single-sender multicast
> >>   Data-Security SAs if replay protection is not needed (e.g., it is
> >>   done on the application level).
> >>
> >> I have no preferences, but perhaps option B looks a bit neater.
> >
> > I’m fine with either of Valery’s proposals but also prefer Option B.
>
> 2) Thank you for your proposal! We have updated the document to use Option
> B.
>
> >>> 39) <!-- [rfced] Please review the "Inclusive Language" portion of the
> online
> >>> Style Guide <
> https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
> >>> and let us know if any changes are needed.  Updates of this nature
> typically
> >>> result in more precise language, which is helpful for readers.
> >>>
> >>> For example, please consider whether the term "man-in-the-middle"
> should be
> >>> updated. -->
> >>
> >> I believe we can use "person-in-the-middle" instead.
> >> I failed to find other issues with inclusive language guide in the text.
> >
> > Alternatively, “On-Path Attack Protection”.
>
> 3) We have updated to use "on-path attack protection" (as this is a common
> replacement for "man-in-the-middle").
>
> >> 40) Not all new IANA registries added to
> https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml
> >> are properly filled in. In particular, the "Reserved for Private Use"
> ranges in the "GSA Attributes",
> >> the "Group-wide Policy Attributes" and the "Member Key Bag Attributes"
> registries do not
> >> reference to this document (while the "Group Key Bag Attributes"
> registry does).
>
> 4) Thank you for pointing this out! We will ask IANA to update these
> registries. We will also ask them to correct the "Unassigned" range in
> Table 13 (as mentioned in mail from 9/24).
>
> >> I also have a proposal. The draft references
> draft-ietf-ipsecme-ikev2-qr-alt-10,
> >> which is currently in the RFC Editor queue in the state "AUTH48".
> >> While it is only informatively referenced, I think that it would be
> better if it is referenced
> >> as RFC and not as I-D. Can you please make this possible (I think it
> would require adding
> >> draft-ietf-ipsecme-ikev2-qr-alt-10 to C532 cluster).
>
> 5) Understood! As of right now, the document is cited as
> [IPSEC-IKEV2-QR-ALT] in the text. Would you like to update to use [RFC9867]?
>
> The files have been posted here (please refresh):
>    https://www.rfc-editor.org/authors/rfc9838.txt
>    https://www.rfc-editor.org/authors/rfc9838.pdf
>    https://www.rfc-editor.org/authors/rfc9838.html
>    https://www.rfc-editor.org/authors/rfc9838.xml
>
> Diff files:
>    https://www.rfc-editor.org/authors/rfc9838-diff.html
>    https://www.rfc-editor.org/authors/rfc9838-rfcdiff.html (side by side)
>    https://www.rfc-editor.org/authors/rfc9838-auth48diff.html
>    https://www.rfc-editor.org/authors/rfc9838-auth48rfcdiff.html  (side
> by side)
>
> For the AUTH48 status page, please see:
> https://www.rfc-editor.org/auth48/rfc9838.
>
> Thank you!
>
> Madison Church
> RFC Editor
>
> >> Regards,
> >> Valery.
> >>
> >>
> >>> Thank you.
> >>>
> >>> Madison Church and Karen Moore
> >>> RFC Production Center
> >>>
> >>>
> >>> On Sep 11, 2025, at 7:14 PM, RFC Editor via auth48archive <
> [email protected]> wrote:
> >>>
> >>> *****IMPORTANT*****
> >>>
> >>> Updated 2025/09/11
> >>>
> >>> RFC Author(s):
> >>> --------------
> >>>
> >>> Instructions for Completing AUTH48
> >>>
> >>> Your document has now entered AUTH48.  Once it has been reviewed and
> >>> approved by you and all coauthors, it will be published as an RFC.
> >>> If an author is no longer available, there are several remedies
> >>> available as listed in the FAQ (https://www.rfc-editor.org/faq/).
> >>>
> >>> You and you coauthors are responsible for engaging other parties
> >>> (e.g., Contributors or Working Group) as necessary before providing
> >>> your approval.
> >>>
> >>> Planning your review
> >>> ---------------------
> >>>
> >>> Please review the following aspects of your document:
> >>>
> >>> *  RFC Editor questions
> >>>
> >>>  Please review and resolve any questions raised by the RFC Editor
> >>>  that have been included in the XML file as comments marked as
> >>>  follows:
> >>>
> >>>  <!-- [rfced] ... -->
> >>>
> >>>  These questions will also be sent in a subsequent email.
> >>>
> >>> *  Changes submitted by coauthors
> >>>
> >>>  Please ensure that you review any changes submitted by your
> >>>  coauthors.  We assume that if you do not speak up that you
> >>>  agree to changes submitted by your coauthors.
> >>>
> >>> *  Content
> >>>
> >>>  Please review the full content of the document, as this cannot
> >>>  change once the RFC is published.  Please pay particular attention to:
> >>>  - IANA considerations updates (if applicable)
> >>>  - contact information
> >>>  - references
> >>>
> >>> *  Copyright notices and legends
> >>>
> >>>  Please review the copyright notice and legends as defined in
> >>>  RFC 5378 and the Trust Legal Provisions
> >>>  (TLP – https://trustee.ietf.org/license-info).
> >>>
> >>> *  Semantic markup
> >>>
> >>>  Please review the markup in the XML file to ensure that elements of
> >>>  content are correctly tagged.  For example, ensure that <sourcecode>
> >>>  and <artwork> are set correctly.  See details at
> >>>  <https://authors.ietf.org/rfcxml-vocabulary>.
> >>>
> >>> *  Formatted output
> >>>
> >>>  Please review the PDF, HTML, and TXT files to ensure that the
> >>>  formatted output, as generated from the markup in the XML file, is
> >>>  reasonable.  Please note that the TXT will have formatting
> >>>  limitations compared to the PDF and HTML.
> >>>
> >>>
> >>> Submitting changes
> >>> ------------------
> >>>
> >>> To submit changes, please reply to this email using ‘REPLY ALL’ as all
> >>> the parties CCed on this message need to see your changes. The parties
> >>> include:
> >>>
> >>>  *  your coauthors
> >>>
> >>>  *  [email protected] (the RPC team)
> >>>
> >>>  *  other document participants, depending on the stream (e.g.,
> >>>     IETF Stream participants are your working group chairs, the
> >>>     responsible ADs, and the document shepherd).
> >>>
> >>>  *  [email protected], which is a new archival mailing list
> >>>     to preserve AUTH48 conversations; it is not an active discussion
> >>>     list:
> >>>
> >>>    *  More info:
> >>>
> https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc
> >>>
> >>>    *  The archive itself:
> >>>       https://mailarchive.ietf.org/arch/browse/auth48archive/
> >>>
> >>>    *  Note: If only absolutely necessary, you may temporarily opt out
> >>>       of the archiving of messages (e.g., to discuss a sensitive
> matter).
> >>>       If needed, please add a note at the top of the message that you
> >>>       have dropped the address. When the discussion is concluded,
> >>>       [email protected] will be re-added to the CC list and
> >>>       its addition will be noted at the top of the message.
> >>>
> >>> You may submit your changes in one of two ways:
> >>>
> >>> An update to the provided XML file
> >>> — OR —
> >>> An explicit list of changes in this format
> >>>
> >>> Section # (or indicate Global)
> >>>
> >>> OLD:
> >>> old text
> >>>
> >>> NEW:
> >>> new text
> >>>
> >>> You do not need to reply with both an updated XML file and an explicit
> >>> list of changes, as either form is sufficient.
> >>>
> >>> We will ask a stream manager to review and approve any changes that
> seem
> >>> beyond editorial in nature, e.g., addition of new text, deletion of
> text,
> >>> and technical changes.  Information about stream managers can be found
> in
> >>> the FAQ.  Editorial changes do not require approval from a stream
> manager.
> >>>
> >>>
> >>> Approving for publication
> >>> --------------------------
> >>>
> >>> To approve your RFC for publication, please reply to this email stating
> >>> that you approve this RFC for publication.  Please use ‘REPLY ALL’,
> >>> as all the parties CCed on this message need to see your approval.
> >>>
> >>>
> >>> Files
> >>> -----
> >>>
> >>> The files are available here:
> >>>  https://www.rfc-editor.org/authors/rfc9838.xml
> >>>  https://www.rfc-editor.org/authors/rfc9838.html
> >>>  https://www.rfc-editor.org/authors/rfc9838.pdf
> >>>  https://www.rfc-editor.org/authors/rfc9838.txt
> >>>
> >>> Diff file of the text:
> >>>  https://www.rfc-editor.org/authors/rfc9838-diff.html
> >>>  https://www.rfc-editor.org/authors/rfc9838-rfcdiff.html (side by
> side)
> >>>
> >>> Diff of the XML:
> >>>  https://www.rfc-editor.org/authors/rfc9838-xmldiff1.html
> >>>
> >>>
> >>> Tracking progress
> >>> -----------------
> >>>
> >>> The details of the AUTH48 status of your document are here:
> >>>  https://www.rfc-editor.org/auth48/rfc9838
> >>>
> >>> Please let us know if you have any questions.
> >>>
> >>> Thank you for your cooperation,
> >>>
> >>> RFC Editor
> >>>
> >>> --------------------------------------
> >>> RFC9838 (draft-ietf-ipsecme-g-ikev2-23)
> >>>
> >>> Title            : Group Key Management using IKEv2
> >>> Author(s)        : V. Smyslov, B. Weis
> >>> WG Chair(s)      : Yoav Nir, Tero Kivinen
> >>>
> >>> Area Director(s) : Deb Cooley, Paul Wouters
> >>>
> >>>
> >>> --
> >>> auth48archive mailing list -- [email protected]
> >>> To unsubscribe send an email to [email protected]
>
-- 
auth48archive mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to