Hi Madison and Karen,

I have added to Valery’s comments. Suggested resolutions on which I did not 
comment seem correct to me.

> On Sep 19, 2025, at 6:45 AM, Valery Smyslov <[email protected]> wrote:
> 
> Hi Madison and Karen,
> 
> thank you, please find my answers inline. I have not yet reviewed all the 
> changes (via diff)
> and have not check whether IANA Considerations section matches IANA page.
> The amount of changes is significant, so I plan to do this after you process 
> this message.
> 
> Note that my co-author (Brian Weis) may express his own opinion on some 
> topics. 
> 
>> Authors,
>> 
>> While reviewing this document during AUTH48, please resolve (as necessary) 
>> the following questions, which are
>> also in the source file.
>> 
>> 1) <!-- [rfced] Because this document obsoletes RFC 6407, please review
>> the errata reported for RFC 6407
>> (https://www.rfc-editor.org/errata_search.php?rfc=6407) and let
>> us know if you confirm our opinion that none of them are relevant
>> to the content of this document.
>> -->
> 
> Confirmed.
> 
> 
>> 2) <!-- [rfced] Please note that the title of the document has been updated 
>> to
>> expand abbreviations per Section 3.6 of RFC 7322 ("RFC Style Guide").
>> 
>> Original:
>>   Group Key Management using IKEv2
>> 
>> Current:
>>   Group Key Management Using the Internet Key Exchange
>>   Protocol Version 2 (IKEv2)
>> -->
> 
> This is OK.
> 
> 
>> 3) <!-- [rfced] Please insert any keywords (beyond those that appear in
>> the title) for use on https://www.rfc-editor.org/search. -->
> 
> multicast
> security
> IPsec
> GDOI
> MSEC
> 
> 
>> 4) <!-- [rfced] Please review whether any of the notes in this document
>> should be in the <aside> element. It is defined as "a container for
>> content that is semantically less important or tangential to the
>> content that surrounds it" 
>> (https://authors.ietf.org/en/rfcxml-vocabulary#aside).
>> -->
> 
> I'm not sure I understand the visual effect of <aside> element (I guess this 
> is an xml2rfc v3 feature).
> Can you point me to RFCs that use this element?
> 
> And do you have some parts of this document in mind that
> this element can be useful for?
> 
> 
>> 5) <!--[rfced] As the full titles of RFCs 3740, 5374, and 6407 are
>> included in Section 1, we removed the titles from the following
>> text in Section 1.2. Please let us know of any objections.
>> 
>> Original:
>>   The following key terms are used throughout this document (mostly
>>   borrowed from the Multicast Group Security Architecture [RFC3740],
>>   Multicast Extensions to the Security Architecture [RFC5374], and the
>>   Group Domain of Interpretation (GDOI) [RFC6407]).
>> 
>> Current:
>>   The following key terms are used throughout this document (mostly
>>   borrowed from [RFC3740], [RFC5374], and [RFC6407]).
>> -->
> 
> Fine with me, thank you..
> 
> 
>> 6) <!-- [rfced] Should the following sentence be rephrased as shown below
>> to clarify "IKE SA"?
>> 
>> Current:
>>   G-IKEv2 MAY also use TCP transport for registration (unicast) IKE SA,
>>   as defined in TCP Encapsulation of IKEv2 and IPsec [RFC9329].
>> 
>> Perhaps:
>>   G-IKEv2 MAY also use TCP transport for the registration (unicast) of IKE 
>> SA,
>>   as defined in TCP Encapsulation of IKEv2 and IPsec [RFC9329].
>> -->
> 
> No, this makes it meaningless. I seem to guess what the problem
> with the sentence is (the lack of article, as my usual problem), 
> but in this case the correct change would be:
> 
> NEW:
>    G-IKEv2 MAY also use TCP transport for the IKE SA used for registration 
> (which is unicast),
>    as defined in TCP Encapsulation of IKEv2 and IPsec [RFC9329].
> 
>> 7) <!-- [rfced] Please review Table 1 in Section 2.2. We note that there
>> is some variation between the payload names used in this table
>> and those used in RFC 7296. For example, in RFC 7296, "HDR" is
>> "IKE header (not a payload)" and "SK" is "Encrypted and
>> Authenticated". Please let us know if we should update this table
>> to match what appears in RFC 7296.
> 
> I think that the description of HDR should
> match that in RFC 7296 ("IKE header (not a payload)".
> 
> Regarding SK I prefer the description to be:
> 
> NEW:
> "Encrypted and Authenticated (also known as Encrypted)"
> 
> The reason is that this payload is almost always referred to as
> "Encrypted" (even in RFC7296), while it is officially named
> "Encrypted and Authenticated". This document also 
> refers to this payload to as "Encrypted", thus we should 
> only clarify that these names define the same payload.
> 
> 
>> In addition, we note the following variations in Table 1 and the
>> running text. Should the payload for "IDg" be updated as "Group
>> Identification" to match Table 18 (i.e., the "IKEv2 Payload Types"
>> IANA registry)? Please let us know how we may make these
>> consistent.
>> 
>>  IDg: Identification - Group (Table 1) vs.
> 
> Yes, please change the name in the Table 1 of to match that in the Table 18.
> 
> CURRENT:
> Identification - Group
> 
> NEW:
> Group Identification
> 
> 
>>  Group Identification (IDg) vs.
> 
> This is the correct payload name.
> 
> 
>>  Group ID (IDg) vs.
> 
> I found a single occurrence of "Group ID (IDg)" - in Section 2.2 below Table 
> 1:
> 
> CURRENT:
> Group ID (IDg):
> 
> NEW:
> Group Identification (IDg):
> 
> 
>>  group IDg vs.
> 
> I found a single occurrence of "group IDg" - in Section 2.3.2:
> 
> CURRENT:
>   The group member SHOULD notify the GCKS by sending
>   IDg and the Notify type NO_PROPOSAL_CHOSEN or REGISTRATION_FAILED as
>   shown below.  In this case, the GCKS MUST remove the GM from the
>   group IDg.
> 
> Please, update this text as follows:
> 
> NEW:
>   The group member SHOULD notify the GCKS by sending
>   IDg and the Notify type NO_PROPOSAL_CHOSEN or REGISTRATION_FAILED as
>   shown below.  In this case, the GCKS MUST remove the GM from the
>   group denoted in IDg.
> 
> 
>>  group ID
> 
> I found a single occurrence of "group ID" - in Section 4.7.1:
> 
> Please, update this para as follows:
> 
> CURRENT:
>   INVALID_GROUP_ID (45) is a new error type notification that indicates
>   that the group ID sent during the registration process is invalid.
> 
> NEW:
>   INVALID_GROUP_ID (45) is a new error type notification that indicates
>   that the IDg payload sent during the registration process denotes invalid 
> group.
> 
>> -->
> 
> 
>> 8) <!--[rfced] In the following, should "Data-Security SAs" be singular
>> since "TEK" is singular?  Also, are all of these items optional
>> (option A), or are only the Rekey SA and Group-wide policy
>> optional (option B)?
>> 
>> Original:
>>   This policy describes the optional Rekey SA (KEK),
>>   Data-Security SAs (TEK), and optional Group-wide (GW)
>>   policy.
>> 
>> Perhaps A:
>>   This policy describes the Rekey SA (KEK),
>>   Data-Security SA (TEK), and Group-wide (GW)
>>   policy, which are all optional.
>> 
>> or
>> Perhaps B:
>>   This policy describes the Data-Security SA (TEK), optional
>>   Rekey SA (KEK), and optional Group-wide (GW) policy.
>> -->
> 
> I propose the following text instead:
> 
> NEW:
>    This policy describes one or more Data-Security SAs (TEK), zero or one 
> Rekey SA (KEK), 
>    and zero or one Group-wide (GW) policy.
> 
> I realize that TEK is still in a singular form, but I hope this is acceptable.
> Let me know if this must be changed by all means.

The TEK (or TEKs) could also be optional as well. Here is clarifying text from 
Section 4.4.1:

GSA payload may contain zero or one GSA KEK policy,
zero or more GSA TEK policies, and zero or one GW policy, where either one GSA 
KEK or one
GSA TEK policy MUST be present.

I would suggest an amended version of Valery’s proposal. Perhaps:

NEW:
   This policy describes zero or more Data-Security SAs (TEK), zero or one 
Rekey SA (KEK), 
   and zero or one Group-wide (GW) policy (although at least one TEK or KEK 
policy MUST be
   Present).

(Technical Rationale): The prime use case for this is a multicast video event 
where the GCKS delivered a 
KEK during registration to all group members, followed by TEKs sent in a rekey 
just before the event begins.  


>> 9) <!-- [rfced] How may we update the sentence below to clarify the second
>> and third instances of "Transforms"?
>> 
>> Original:
>>   *  The GCKS could store the list of Transforms, with the goal of
>>      migrating the group policy to a different Transforms when all of
>>      the group members indicate that they can support that Transforms.
>> 
>> Perhaps A:
>>   *  The GCKS could store the list of Transforms with the goal of
>>      migrating the group policy to a different Transform when all of
>>      the group members indicate that they can support that Transform.
>> 
>> or
>> Perhaps B:
>>   *  The GCKS could store the list of Transforms with the goal of
>>      migrating the group policy to a different Transforms list when all of
>>      the group members indicate that they can support that Transforms list.
>> -->
> 
> I propose the following clarification:
> 
> NEW:
>   *  The GCKS could store the list of transforms with the goal of
>      migrating the group policy from the current set of transforms to 
>      a different one once all of the group members indicate that they 
>      can support transforms from the new set.
> 
> 
>> 10) <!--[rfced] How may we clarify this sentence. Should "KEK" be plural
>> like "TEKs"? Does the GCKS delete the TEKs and/or exclude the
>> group members as shown below?
>> 
>> Original:
>>   Rekeying is an operation whereby the GCKS provides
>>   replacement TEKs and KEK, deleting TEKs, and/or
>>   excluding group members.
>> 
>> Perhaps:
>>   Rekeying is an operation whereby the GCKS provides
>>   replacement TEKs and KEKs, deletes TEKs, and/or
>>   excludes group members.
>> -->
> 
> There may be several TEKs (one or more), but only one KEK.
> Perhaps:
> 
> NEW:
>    Rekeying is an operation whereby the GCKS provides
>    replacement TEK(s) and KEK, deleting TEK(s), and/or
>    excluding group members.
> 
> 
>> 11) <!--[rfced] Should "a Data-Security SAs" be singular or plural in this
>> sentence (e.g., "a new Data-Security SA" or "new Data-Security
>> SAs")?
>> 
>> Original:
>>   The GSA may contain a new Rekey SA and/or a new Data-
>>   Security SAs Section 4.4.
>> 
>> Perhaps:
>>   The GSA may contain a new Rekey SA and/or a new Data-
>>   Security SA (Section 4.4).
>> -->
> 
> There may be zero or more Data-Security SAs but no more than one Rekey SA,
> and at list one SA of any type must be present. Perhaps:
> 
> NEW:
>    The GSA may contain a new Rekey SA and/or new Data-
>    Security SA(s) Section 4.4.
> 
> 
>> 12) <!-- [rfced] FYI: We updated "that with" to "with the" as follows.
>> 
>> Original:
>>   The RESERVED field in the reconstructed Encrypted Payload header
>>   MUST be set to the value of the RESERVED field in the Encrypted
>>   Fragment payload header from the first fragment (that with
>>   Fragment Number equal to 1).
>> 
>> Current:
>>   The RESERVED field in the reconstructed Encrypted Payload header
>>   MUST be set to the value of the RESERVED field in the Encrypted
>>   Fragment payload header from the first fragment (with the
>>   Fragment Number equal to 1).
>> -->
> 
> This change is fine, thank you.
> 
> 
>> 13) <!-- [rfced] We added parentheses to this sentence for ease of
>> reading. Please let us know of any objections.
>> 
>> Original:
>>   If the message includes Delete payload for existing Data-Security SA,
>>   then after installing a new Data-Security SA the old one, identified
>>   by the Protocol and SPI fields in the Delete payload, MUST be silently
>>   deleted after waiting DEACTIVATION_TIME_DELAY interval regardless of
>>   its expiration time.
>> 
>> Current:
>>   If the message includes a Delete payload for an existing Data-Security SA,
>>   then after installing a new Data-Security SA, the old one (identified by 
>> the
>>   Protocol and SPI fields in the Delete payload) MUST be silently deleted 
>> after
>>   waiting the DEACTIVATION_TIME_DELAY interval regardless of its expiration 
>> time.
>> -->
> 
> This change is fine, thank you.
> 
> 
>> 14) <!-- [rfced] We have updated this sentence to use "AES CCM" (per
>> RFC 4309) rather than "AES-CCM". Please let us know any
>> objections.
>> 
>> Original:
>>   Several counter-based modes of operation have been specified for ESP
>>   (e.g., AES-CTR [RFC3686], AES-GCM [RFC4106], AES-CCM [RFC4309],
>>   ChaCha20-Poly1305 [RFC7634], AES-GMAC [RFC4543]) and AH (e.g., AES-
>>   GMAC [RFC4543]).
>> 
>> Current:
>>   Several counter-based modes of operation have been specified for ESP
>>   (e.g., AES-CTR [RFC3686], AES-GCM [RFC4106], AES CCM [RFC4309],
>>   ChaCha20-Poly1305 [RFC7634], and AES-GMAC [RFC4543]) and AH (e.g., AES-
>>   GMAC [RFC4543]).
>> -->
> 
> Hmm, obviously, I should have no objections to this as RFC 4309 uses this form
> but actually this is a big surprise for me: the lack of consistency in naming 
> :-)
> 
> And a number of RFCs related to IPsec (I suspect there are others too) 
> actually use "AES-CCM" form
> (RFC8247, RFC7321). Thus, I have no position and rely on AD's decision on 
> this.

I also have no objections and would rely on an AD’s decision.

> 
>> 15) <!--[rfced] Please clarify what "literature" refers to here.
>> 
>> Original:
>>   Group management algorithms providing forward and backward access
>>   control other than LKH have been proposed in the literature,
>>   including OFT [OFT] and Subset Difference [NNL].
>> 
>> Perhaps:
>>   Group management algorithms providing forward and backward access
>>   control other than LKH have been proposed in other specifications,
>>   for example, OFT [OFT] and Subset Difference [NNL].
>> -->
> 
> I think we may change it to:
> 
> NEW:
>    Group management algorithms providing forward and backward access
>    control other than LKH have also been proposed,
>    for example, OFT [OFT] and Subset Difference [NNL].
> 
> 
>> 16) <!-- [rfced] May we update "if they are take place" for clarity in the
>> sentence below?
>> 
>> Original:
>>   For the unicast IKE SA (used for the GM registration and for the
>>   GSA_INBAND_REKEY exchanges, if they are take place) the GSK_w is
>>   computed as follows:
>> 
>> Perhaps:
>>   For the unicast IKE SA (used for the GM registration and for
>>   GSA_INBAND_REKEY exchanges if they appear), the GSK_w is
>>   computed as follows:
>> -->
> 
> Yes, thank you.
> 
> 
>> 17) <!--[rfced] Is "null termination" correct, or should it be "NUL 
>> termination"?
>> 
>> Current:
>>   where the string "Key Wrap for G-IKEv2" is 20 ASCII characters
>>   without null termination.
>> -->
> 
> This text is borrowed verbatim from RFC 7296 (Section 2.15),
> thus I believe should remain unchanged.
> 
> 
>> 18) <!-- [rfced] We have replaced "it" with "GM" for clarity and removed
>> "this GM" to avoid redundancy. Please let us know if this is not
>> correct.
>> 
>> Original:
>>   This situation may only happen at the time the GM is registering to
>>   the group, when the GCKS is providing it with its personal key and the 
>> other
>>   keys from the key tree that are needed for this GM.
>> 
>> Current:
>>   This situation may only happen at the time the GM is registering to
>>   the group, when the GCKS is providing the GM with its personal key and the
>>   other keys from the key tree that are needed.
>> -->
> 
> I'm fine with this change, thank you.
> 
> 
>> 19) <!-- [rfced] In this sentence, is GSK_e used for the Encryption
>> Algorithm and GSK_a for the Integrity Algorithm (option A), or
>> are GSK_e and GSK_a used for both the Encryption Algorithm and
>> the Integrity Algorithm (option B)?
>> 
>> Original:
>>   where GSK_e and GSK_a are the keys used for the Encryption Algorithm
>>   and the Integrity Algorithm transforms for the corresponding SA and
>>   GSK_w is a default KWK for this SA.
>> 
>> Perhaps A:
>>   where GSK_e and GSK_a are the keys used for the Encryption Algorithm and
>>   the Integrity Algorithm transforms, respectively, for the corresponding
>>   SA and GSK_w is a default KWK for this SA.
>> 
>> or
>> Perhaps B:
>>   where GSK_e and GSK_a are the keys used for both the Encryption Algorithm
>>   and the Integrity Algorithm transforms for the corresponding SA and
>>   GSK_w is a default KWK for this SA.
>> -->
> 
> Option A is correct.
> 
> 
>> 20) <!-- [rfced] FYI - We have updated the following sentence to reduce
>> the repetition of "payload" and to match use in Table 1. Please
>> let us know any objections.
>> 
>> Original:
>>   The Security Association - GM Supported Transforms Payload (SAg)
>>   payload declares which Transforms a GM is willing to accept.
>> 
>> Current:
>>   The Security Association - GM Supported Transforms (SAg) payload
>>   declares which Transforms a GM is willing to accept.
>> -->
> 
> No objections, thank you.
> 
> 
>> 21) <!-- [rfced] Should "Last Substruc" be "Last Substruct" or "Last
>> Substructure" in the sentence below? Or is "Last Substruc"
>> correct here?
>> 
>> Original:
>>   The "Last Substruc" field in each Transform Substructure is set to 3
>>   except for the last Transform Substructure, where it is set to 0.
>> 
>> Perhaps:
>>   The "Last Substructure" field in each Transform Substructure is set
>>   to 3 except for the last Transform Substructure, where it is set to 0.
>> -->
> 
> The original text is correct. It refers to the field name (weird, I agree),
> defined in RFC 7296, Section 3.3.2.
> 
> 
>> 22) <!-- [rfced] May we restructure the text below as follows for 
>> readability?
>> 
>> Current:
>>   This transform ID defines the following properties.  Sequence numbers
>>   are 32-bit in size and are transmitted in the Sequence Number field of AH 
>> and
>>   ESP packets.  The value of sequence numbers is not guaranteed to be unique 
>> for
>>   the duration of an SA, thus they are not suitable for replay protection.  
>> This
>>   transform ID MUST be used by the GCKS in case of multi-sender multicast
>>   Data-Security SAs utilizing protocols ESP or AH to inform the GMs that the
>>   replay protection is not expected to be possible.  The GCKS MAY also use 
>> this
>>   transform ID for single-sender multicast Data-Security SAs if replay
>>   protection is not needed (e.g. it is done on application level).
>> 
>> 
>> Perhaps:
>>   This transform ID defines the following properties:
>> 
>>   * Sequence numbers are 32 bits in size and are transmitted in the Sequence
>>     Number field of AH and ESP packets.
>> 
>>   * The value of sequence numbers is not guaranteed to be unique for
>>     the duration of an SA, thus they are not suitable for replay
>>     protection.
>> 
>>   * This transform ID MUST be used by the GCKS in the case of multi-sender
>>     multicast Data-Security SAs utilizing protocols ESP or AH to inform
>>     the GMs that the replay protection is not expected to be possible.
>> 
>>   * The GCKS MAY also use this transform ID for single-sender multicast
>>     Data-Security SAs if replay protection is not needed (e.g., it is done
>>     on the application level).
>> -->
> 
> Actually, only two first bullet define the properties, the last two
> just explain how to use this transform ID. I propose instead the following
> variants.
> 
> Option A - split para and do not add list:
> 
> NEW (Option A):
>   This transform ID defines the
>   following properties.  Sequence numbers are 32 bits in size and are
>   transmitted in the Sequence Number field of AH and ESP packets.  The
>   value of sequence numbers is not guaranteed to be unique for the
>   duration of an SA, thus they are not suitable for replay protection.
> 
>   This transform ID MUST be used by the GCKS in case of multi-sender
>   multicast Data-Security SAs utilizing protocols ESP or AH to inform
>   the GMs that the replay protection is not expected to be possible.
>   The GCKS MAY also use this transform ID for single-sender multicast
>   Data-Security SAs if replay protection is not needed (e.g., it is
>   done on the application level).
> 
> Option B - use list for properties only:
> 
> NEW (Option B):
>    This transform ID defines the following properties:
> 
>    * Sequence numbers are 32 bits in size and are transmitted in the Sequence
>      Number field of AH and ESP packets.
> 
>    * The value of sequence numbers is not guaranteed to be unique for
>      the duration of an SA, thus they are not suitable for replay
>      protection.
> 
>   This transform ID MUST be used by the GCKS in case of multi-sender
>   multicast Data-Security SAs utilizing protocols ESP or AH to inform
>   the GMs that the replay protection is not expected to be possible.
>   The GCKS MAY also use this transform ID for single-sender multicast
>   Data-Security SAs if replay protection is not needed (e.g., it is
>   done on the application level).
> 
> I have no preferences, but perhaps option B looks a bit neater.

I’m fine with either of Valery’s proposals but also prefer Option B.

> 
> 
>> 23) <!--[rfced] May we rephrase this sentence as shown below for clarity
>> (i.e., remove "in these cases" to reduce redundancy)? Note that
>> we included the lead-in sentence for context.
>> 
>> Lead-in sentence:
>>   A single attribute of this type is included into the GSA KEK policy
>>   substructure if the initial Message ID of the Rekey SA is non-zero.
>> 
>> Original:
>>   Note, that it is always the case if GMs join the group after some
>>   multicast rekey operations have already taken place, so in these
>>   cases this attribute will be included into the GSA policy when the
>>   GM is registered.
>> 
>> Perhaps:
>>   Note that this is always the case if GMs join the group after some
>>   multicast rekey operations have already taken place, so this
>>   attribute will be included into the GSA policy when the GM is
>>   registered.
>> -->
> 
> I think it can be rephrased for clarity:
> 
> NEW:
>   Note that it is always true if a GM joins the group after some
>   multicast rekey operations have already taken place in this group.
>   In this case this attribute will be included into the GSA policy when the
>   GM is registered.
> 
> 
>> 24) <!-- [rfced] We have rephrased the sentence below as follows for
>> clarity. Please let us know any objections.
>> 
>> Original:
>>   The GM MAY store these values and if later the GM starts receiving
>>   messages with one of these SPIs without seeing a rekey message over
>>   the current Rekey SA, this may be used as an indication, that the
>>   rekey message got lost on its way to this GM.
>> 
>> Current:
>>   The GM MAY store these values. Later on, if the GM starts receiving
>>   messages with one of these SPIs without seeing a rekey message over
>>   the current Rekey SA, then it may be used as an indication that
>>   the rekey message got lost on its way to this GM.
>> -->
> 
> This change is OK, thank you.
> 
> 
>> 25) <!-- [rfced] Is the space in the parentheses intentional in the text
>> below, or should "( octet)" be updated as "(0 octet)" per the
>> description? Note that there are two instances (Sections 4.4.3
>> and 4.5.3).
>> 
>> Original:
>>   *  RESERVED ( octet) - MUST be zero on transmission, MUST be ignored
>>      on receipt.
>> -->
> 
> This is a typo, it must be:
> 
> NEW:
>   * RESERVED (1 octet):  MUST be zero on transmission and MUST be ignored
>      on receipt.
> 
> in both places ("1 octet" is the size of the field).
> 
> I also noticed that in Section 4.4.3 the style of field descriptions differs
> from that in other places - in Section 4.4.3 a description starts on the same
> line as the field name, while in all other places it starts on the next line.
> Can we make this consistent across the document?
> 
> 
>> 26) <!--[rfced] "Length" vs. "Payload Length"
>> 
>> a) We note that Figure 16 uses "Payload Length" whereas
>> Figures 17, 18, 19, 20, and 21 use "Length". Is this
>> variance okay, or is an update needed to Figure 16
>> for consistency?
> 
> Thank you for bringing this to my attention.
> 
> This variance is OK (but see below). Figure 16 depicts a payload,
> generic payload header is defined in Section 3.2 of RFC 7296
> and the length there is denoted as "Payload Length".
> Other figures (except for 19) define various substructures inside 
> payloads that are not payloads themselves and use
> more generic "Length" name for the field.
> 
> However, Figure 19 also depicts a payload, but this is related to the next 
> item...
> 
> 
>> b) In Section 4.5, we note "Length" in Figure 19 but "Payload
>> Length" in the description. We updated the description to
>> reflect "Length" as shown below. If that is not correct,
>> please let us know.
>> 
>> Original:
>>   Next Payload, C, RESERVED, and Payload Length fields:
>>      Comprise the IKEv2 Generic Payload Header and are defined in
>>      Section 3.2 of [RFC7296].
>> 
>> Current:
>>   Next Payload, C, RESERVED, and Length fields:
>>      Comprise the IKEv2 Generic Payload Header and are defined in
>>      Section 3.2 of [RFC7296].
>> -->
> 
> Since Figure 19 depicts a payload, the correct name of the field is "Payload 
> Length".
> 
> Please, revert the above change and also change the name in the figure
> from "Length" to "Payload Length":
> 
> NEW:
>   | Next Payload  |C|  RESERVED   |        Payload Length         |
> 
> 
>> 27) <!-- [rfced] May we rephrase the following text to simplify the
>> sentence structure? Also, does "the following SPI" refer to the
>> SPI in Figure 20?
>> 
>> Original:
>>   For this reason two types of key bags are defined - Group Key Bag
>>   and Member Key Bag. The type is unambiguously determined by the first
>>   byte of the key bag substructure - for member key bag it is zero and
>>   for group key bag it represents the protocol number, which along with
>>   the following SPI, identify the SA associated with the keys in the
>>   bag.
>> 
>> Perhaps:
>>   For this reason, two types of key bags are defined: Group Key Bag and
>>   Member Key Bag. The type is unambiguously determined by the first byte of
>>   the key bag substructure; for a Member Key Bag, it is zero. The Group Key
>>   Gag is represented by the protocol number, and the protocol number along
>>   with the SPI (see Figure 20) identify the SA that is associated with
>>   the keys in the bag.
>> -->
> 
> I think that this text hides the point that the first byte of key bag 
> substructure 
> allows to distinguish between member key bag and group key bag (and there
> is also a typo "Group Key Gag"). Instead, I propose the following change
> (based on your text):
> 
> NEW:
>    For this reason, two types of key bags are defined: Group Key Bag and
>    Member Key Bag. The type is unambiguously determined by the first byte of
>    the key bag substructure; for a Member Key Bag, it is zero and for a Group
>    Key Bag it is a protocol number, which is always non-zero. 
>    For a Group Key Bag the protocol number along with the SPI (see Figure 20) 
>    identify the SA that is associated with the keys in this bag.
> 
> 
>> 28) <!-- [rfced] Please review Table 7 and let us know if the format appears
>> as intended. Specifically, are the "Multi-Valued" and "Used in Protocol"
>> columns correctly formatted?
>> -->
> 
> The format is correct and is intentional. The idea is that we actually have
> 2 lines for SA_KEY - in case in is used in GIKE_UPDATE it is multi-valued,
> in case it is used in AH and ESP - it is single-valued. 
> 
> The same format is used in Table 15.
> 
> We discussed this with IANA and they created the table with exactly 
> this format.
> 
> 
>> 29) <!-- [rfced] FYI - We rephrased the text below for better sentence
>> flow. Please let us know of any objections.
>> 
>> Original:
>>   If the key bag is for a Rekey SA (GIKE_UPDATE protocol), then in the
>>   GSA_AUTH, GSA_REGISTRATION and GSA_INBAND_REKEY exchanges exactly one 
>> SA_KEY
>>   attribute MUST be present.
>> 
>> Current:
>>   If the key bag is for a Rekey SA (GIKE_UPDATE protocol), then exactly
>>   one SA_KEY attribute MUST be present in the GSA_AUTH, GSA_REGISTRATION, and
>>   GSA_INBAND_REKEY exchanges.
>> -->
> 
> Fine, thank you.
> 
> 
>> 30) <!-- [rfced] In Section 4.5.3.2, since there is only one list item in
>> this unordered list, would it be appropriate to remove the bullet
>> and make it into a paragraph?
>> 
>> Original:
>>   *  If digital signatures are used for the GSA_REKEY message
>>      authentication then the content of the AUTH_KEY attribute is a
>>      public key used for digital signature authentication.  The public
>>      key MUST be represented as DER-encoded ASN.1 object
>>      SubjectPublicKeyInfo, defined in Section 4.1.2.7 of "Internet
>>      X.509 Public Key Infrastructure Certificate and Certificate
>>      Revocation List (CRL) Profile" [RFC5280].  The algorithm field
>>      inside the SubjectPublicKeyInfo object MUST match the content of
>>      the Signature Algorithm Identifier attribute in the Group
>>      Controller Authentication Method transform.  When the id-RSASSA-
>>      PSS object identifier appears in the algorithm field of the
>>      SubjectPublicKeyInfo object, then the parameters field MUST
>>      include the RSASSA-PSS-params structure.
>> 
>> Perhaps:
>>   If digital signatures are used for the GSA_REKEY message
>>   authentication, then the content of the AUTH_KEY attribute is a
>>   public key used for digital signature authentication.  The public
>>   key MUST be represented as DER-encoded ASN.1 object
>>   SubjectPublicKeyInfo, defined in Section 4.1.2.7 of
>>   [RFC5280].  The algorithm field inside the SubjectPublicKeyInfo
>>   object MUST match the content of the Signature Algorithm
>>   Identifier attribute in the Group Controller Authentication Method
>>   transform.  When the id-RSASSA-PSS object identifier appears in
>>   the algorithm field of the SubjectPublicKeyInfo object, then the
>>   parameters field MUST include the RSASSA-PSS-params structure.
>> -->
> 
> I'd rather keep the list even that it is redundant here - it shows that 
> the content of the AUTH_KEY Attribute depends on authentication method,
> even that the current document defines only one.
> 
> Perhaps we can add a bullet here to make using list justified:
> 
> NEW (a new bullet in the list):
> * In case of implicit authentication the AUTH_KEY Attribute is not used 
>  and MUST be absent (see Section 2.4.1).
> 
> 
> (note, that this is not a new requirement, this is only a paraphrase 
> of what the last sentence in 2.4.1 says).
> 
> 
>> 31) <!-- [rfced] The following sentence is hard to parse. Would either of
>> the following proposals improve readability and retain the
>> sentence's original meaning?
>> 
>> Original:
>>   Note, that the restrictions are defined per a substructure
>>   corresponding attributes are defined for and not per whole G-IKEv2
>>   message.
>> 
>> Perhaps A:
>>   Note that the restrictions are defined per a substructure
>>   corresponding to the attributes that are defined and not
>>   per a whole G-IKEv2 message.
>> 
>> or
>> Perhaps B:
>>   Note that the restrictions are defined per a substructure for which
>>   corresponding attributes are defined and not per a whole
>>   G-IKEv2 message.
>> -->
> 
> Option B is correct, please use it to improve readability.
> 
> 
>> 32) <!--[rfced] How may we update this sentence to clarify "and more these
>> attributes MAY be present"? Perhaps "one or more SA_KEY
>> attributes MAY be present in a GSA_REKEY exchange"?
>> 
>> Current:
>>   For a Data-Security SA, exactly one SA_KEY attribute MUST be
>>   present. For a Rekey SA, one SA_KEY attribute MUST be present in all
>>   cases and more these attributes MAY be present in a GSA_REKEY exchange.
>> 
>> Perhaps:
>>   For a Data-Security SA, exactly one SA_KEY attribute MUST be
>>   present. For a Rekey SA, one SA_KEY attribute MUST be present in all
>>   cases and one or more SA_KEY attributes MAY be present in a GSA_REKEY
>>   exchange.
>> -->
> 
> I would propose a different text change (also relates to item 42d below):
> 
> NEW:
>    For a Data-Security SA, exactly one SA_KEY attribute MUST be
>    present. For a Rekey SA, at least one SA_KEY attribute MUST be present
>    and, in case of GSA_REKEY pseudo-exchange, additional SA_KEY attributes 
> MAY be present.
> 
> 
>> 33) <!--[rfced] How may we clarify this sentence? Is the sender proven to
>> be a member of the group when the GM "decrypts and verifies the
>> ICV"?
>> 
>> Original:
>>   An implicit authentication can also be used, in which case,
>>   the ability of the GM to decrypt and to verify ICV of the
>>   received message proved that a sender of the message is a
>>   member of the group.
>> 
>> Perhaps:
>>   An implicit authentication can also be used, in which case
>>   the GM decrypts and verifies the ICV of the received
>>   message to prove that a sender of the message is a
>>   member of the group.
>> -->
> 
> This is not incorrect, but the original text tries to stress that 
> the authentication is implicit: the receiver will decrypt
> the message and verify its ICV just to get this message 
> for application and not to (explicitly) authenticate the sender.
> The proposed text sounds like this is the goal.
> 
> Perhaps the following text is clearer:
> 
> NEW:
>    An implicit authentication can also be used, in which case,
>    the ability of the GM to decrypt and to verify ICV of 
>    incoming messages is used as a proof that the sender
>    knows group keys and therefore is a member of the group.
> 
> 
>> 34) <!-- [rfced] We have included some specific questions about the IANA
>> text below. In addition to responding to those questions, please
>> review all of the IANA-related updates carefully, including the
>> IANA values in the running text, and let us know if any further
>> updates are needed.
>> 
>> Please refer to the following URL to view the IANA registries:
>> <https://www.iana.org/assignments/ikev2-parameters/>
>> 
>> a) For Tables 3-7 and 11-16, may we order the "Value" columns first to match
>> the corresponding IANA registries?
> 
> Yes.
> 
> 
>> b) FYI: For Tables 11-16, we updated "Private Use" to "Reserved
>> for Private Use" to match the corresponding IANA registries.
> 
> OK, thank you.
> 
> 
>> c) Please clarify the text below. Was "new registrations" perhaps
>> intended rather than "changes and additions to the unassigned range"?
>> Note that there are multiple instances.
>> 
>> Original:
>>   Changes and additions to the unassigned range of this registry
>>   are by the Expert Review Policy [RFC8126].
>> 
>> Perhaps:
>>   In this registry, new registrations are to be made by Expert
>>   Review [RFC8126].
> 
> Perhaps use even simpler form?
> 
> NEW (proposed):
> The registration policy for this registry is Expert Review [RFC8126].
> 
> 
>> d) May we update the title of the "Group-wide Policy Attributes" registry
>> to "Group-Wide Policy Attributes" (i.e., make "wide" uppercase as it's an
>> adjective within a hyphenated compound)?
> 
> Sure.
> 
> 
>> e) FYI: For clarity, we added the "Reference" column to Table 19 to show
>> that the "Security Association" Payload Type was registered by RFC 7296.
>> If this is not desired, please let us know.
> 
> I don't think this is necessary, because the text above says that this 
> definition
> is updated and not created. In IPsec documents we usually omit "Reference"
> column in IANA considerations, the IANA kindly adds it for us, let us keep 
> this tradition :-)
> 
> 
>> f) Is it helpful for the reader if the history of the SENDER_REQUEST_ID
>> registration is included? If so, should an informative reference to
>> "draft-yeung-g-ikev2-07" (e.g., "[G-IKEV2]") be added (option A)? Or
>> if the history isn't necessary, is option B preferred?
>> 
>> Original:
>>   The Notify type with the value 16429 was allocated earlier in the
>>   development of G-IKEv2 document in the "IKEv2 Notify Message
>>   Status Types" registry with the name SENDER_REQUEST_ID. This document
>>   renames it as follows:
>> 
>> Perhaps A:
>>   An earlier draft of this document [G-IKEV2] registered the Notify
>>   type 16429 with the name SENDER_REQUEST_ID. Per this document,
>>   IANA has updated the "IKEv2 Notify Message Status Types" registry
>>   as follows:
>> 
>> or
>> Perhaps B:
>>   IANA has registered the following in the "IKEv2 Notify Message Status
>>   Types" registry:
>> -->
> 
> I prefer option A. This name existed in IANA registry for decade,
> so it is better to keep the history. Just one minor suggestion - 
> can we be more specific and say "renamed" instead of "updated"?
> 
> NEW (proposed):
>    An earlier draft of this document [G-IKEV2] registered the Notify
>    type 16429 in the "IKEv2 Notify Message Status Types" registry with 
>    the name SENDER_REQUEST_ID. Per this document,
>    IANA has renamed it as follows:
> 
> 
>> 35) <!-- [rfced] May we replace "so after all" with "and thus" in the
>> sentence below for improved clarity?
>> 
>> Current:
>>   Similarly, when other GMs will be joining the group, they will be
>>   provided with the corresponding keys, so after all, the GMs will have
>>   the following Working Key Paths:
>> 
>> Perhaps:
>>   Similarly, when other GMs join the group, they will be
>>   provided with the corresponding keys and thus the GMs
>>   will have the following Working Key Paths:
>> -->
> 
> No objections.
> 
> 
>> 36) <!-- [rfced] Abbreviations
>> 
>> a) FYI - We have added expansions for abbreviations upon first use
>> per Section 3.6 of RFC 7322 ("RFC Style Guide"). Please review each
>> expansion in the document carefully to ensure correctness.
> 
> OK.
> 
> 
>> b) We note that some abbreviations are expanded multiple times
>> throughout the document. If there are no objections, we will update terms
>> to use their abbreviations after their first expansions for consistency.
>> 
>> One example (see the document for more examples):
>> 
>>  Group Member -> GM
>> -->
> 
> No objections.

I didn’t find anything amiss with the abbreviations in the document.

> 
> 
>> 37) <!-- [rfced] Terminology
>> 
>> a) Please review the following terms for capitalization and let us know which
>> form you prefer (uppercase or lowercase) for consistency.
>> 
>> Data-Security vs. data-security
>>   [Note: Only two instances of "data-security" are lowercase;
>>   should they be uppercase?]
> 
> Please keep them as is - these occurrences are not related to SA,
> but to keys and to subsystem. I think it is OK that they are lowercase.
> 
> 
>> Group Member vs. group member
>> Group Receiver vs. group receiver
>> Group Sender vs. group sender
> 
> For these please use lowercase form (unless in captions or when abbreviation 
> is expanded).
> 
> 
>> Group-wide policy vs. group-wide policy
> 
> I believe the current usage of this term is correct - uppercase 
> form is used when abbreviation is given, otherwise lowercase form is used.
> 
> 
>> GSA registration exchange vs. GSA_REGISTRATION exchange
> 
> It's OK, the former is just a clarification of the purpose of exchange,
> the latter is an IANA-given name of this exchange.
> 
> 
>> Header vs. header (when referring to specific headers, e.g., Payload Header 
>> vs. IKE header)
> 
> Please use lowercase form (unless it is "Authentication Header" where it must 
> be uppercase).
> 
> 
>> Key Bag vs. key bag
> 
> I believe the current use of this term is mostly correct - lowercase form is 
> used
> unless this is a name of some structure (like Group Key Bag), in which case
> an uppercase form is used.
> 
> There is one place that violates this rule, please correct.
> 
> Section 4.5:
> 
> CURRENT:
>   Key Bags (variable):
>      A set of Key Bag substructures.
> 
> NEW:
>   Key Bags (variable):
>      A set of key bag substructures.
> 
> 
>> Key information vs. key information
> 
> Please use lowercase form everywhere.
> 
> 
>> Key Wrap Algorithm vs. key wrap algorithm
> 
> I believe the current use is correct - uppercase form is used
> only as a name of corresponding transform, otherwise lowercase 
> form is used.
> 
> 
>> Notify Message vs. Notify message vs. notify message
> 
> Please, make the following changes:
> 
> Section 4.7
> 
> CURRENT:
>   There are additional Notify Message types introduced by G-IKEv2 to
>   communicate error conditions and status (see Section 9).
> 
> NEW:
>   There are additional Notify Message types introduced by G-IKEv2 to
>   communicate error conditions and status (see Section 9).

Valery, your NEW text seems to be identical to the CURRENT text. I think you 
intended:

NEW:
  There are additional Notify message types introduced by G-IKEv2 to
  communicate error conditions and status (see Section 9).

Rationale: to be consistent with RFC 7296, “Notify message” would be best
in the text.  (Or alternatively, “the use of “notification” as suggested by 
Valery below.)
The exception are the IANA registries, where “Notify Message” is used.

> 
> Section 2.3.3
> 
> CURRENT:
>   A GM intending to emit data traffic MUST send a
>   GROUP_SENDER Notify message type.
> 
> NEW:
>   A GM intending to emit data traffic MUST send a
>   GROUP_SENDER notification.
> 
> 
> Section 2.3.4 (3 instances)
> 
> CURRENT:
>   If the GCKS fails to authorize the GM, it
>   responds with an AUTHORIZATION_FAILED Notify message type.  The GCKS
>   may also respond with an INVALID_GROUP_ID notify message if the
>   requested group is unknown to the GCKS or with an REGISTRATION_FAILED
>   notify message if there is a problem with the requested group (e.g.,
>   if the capacity of the group is exceeded).
> 
> NEW:
>   If the GCKS fails to authorize the GM, it
>   responds with an AUTHORIZATION_FAILED notification.  The GCKS
>   may also respond with an INVALID_GROUP_ID notification if the
>   requested group is unknown to the GCKS or with an REGISTRATION_FAILED
>   notification if there is a problem with the requested group (e.g.,
>   if the capacity of the group is exceeded).
> 
> 
> (all to be aligned with RFC 7296, which mostly use "notification")
> 
> 
>> Security Association vs. security association
> 
> Please use only uppercase form (as per RFC 7296).
> 
> 
>>  [Note: should the security association policy be uppercase
>>  (e.g., "Security Association policy")?
> 
> Yes.
> 
> 
>> Transform(s) vs. transform(s)
>> Transform ID vs. transform ID
> 
> These are related. Please use "Transform Type(s)" and "Transform ID(s)"
> (all in uppercase), but "transform(s)" (lowercase) otherwise.
> There seems to be quite a lot of changes, sorry :-(
> 
> 
>> b) We note that the following terms are used inconsistently. Please review 
>> and
>> let us know which form you prefer to use throughout the document.
>> 
>> Data-Security GSA TEK vs. GSA TEK vs. Data-Security SA policy (GSA TEK)
>>   [Note: Are any of these terms the same?]

Yes, they are referring to the same concept, but I’m not sure they can all be 
normalized.
—  “Data-Security SA” is the type of policy used (see Terminology)
— "GSA TEK" is the vehicle in the protocol for relaying that policy.  

I would suggest the following clarifications though:

Setion 2.4.1

OLD
creates new Data-Security GSA TEKs

NEW
creates new Data-Security SAs

Section 4.4.1

OLD
GSA policies may further be classified as Rekey SA policy (GSA KEK)
and Data-Security SA policy (GSA TEK). 

NEW
GSA policies may further be classified as Rekey SA (GSA KEK) policy
and Data-Security SA (GSA TEK) policy. 


>> 
>> group key management vs. group key management protocol

The function of “group key management” includes a “group key management 
protocol”
 in order to distriubute group keys and policy. For example, the heading for 
Section 3
 is “Group Key Management and Access Control”, and it would be inappropriate to 
add
 the word “Protocol”  because it’s referring to the overall function.

Perhaps this would be clearer if the first sentence of Section 1 were updated.

OLD
This document presents an extension to IKEv2 [RFC7296] called
 G-IKEv2, which allows performing group key management.

NEW
This document presents an extension to IKEv2 [RFC7296] called
 G-IKEv2, which accomodates group key management.

>> 
>> Multicast Security (MSEC) Group Key Management Architecture vs.
>>    Multicast Security (MSEC) key management architecture

The Abstract should be corrected to match the later reference:

OLD
The protocol is in conformance with the Multicast Security (MSEC) key
 management architecture

NEW
The protocol is in conformance with the Multicast Security (MSEC) Group Key
Management architecture

(This is the name of RFC 4046, but I believe that references are not included 
in an Abstract.) 

>> 
>> 
>> c) FYI: We updated the text to reflect the forms on the right for 
>> consistency.
>> Please let us know of any objections.
>> 
>> G-IKEv2 Rekey -> G-IKEv2 rekey
>> GKCS -> GCKS
>> group key bag ->  Group Key Bag
>> group security association -> Group Security Association
>> GSA Policy -> GSA policy=
>> IKEv2 Intermediate exchange -> IKEv2 Intermediate Exchange (per RFC 9242)
>> member Key Bag and member key bag -> Member Key Bag
>> NO_PROPOSAL_CHOSEN Notification -> NO_PROPOSAL_CHOSEN notification
>> protocol ID -> Protocol ID
>> Rekey message -> rekey message
>> rekey SA -> Rekey SA
>> Security Association Payload -> Security Association payload (per RFC 7296)
>> Secure Password authentication -> secure password authentication (per RFC 
>> 6467)
>> -->
> 
> OK, thank you.
> 
> 
>> 38) <!-- [rfced] Some figures and tables were updated during the
>> formatting process and do not have titles. Would you like to add
>> titles to the figures and tables below for consistency throughout
>> the document? If so, please let us know the desired text.
>> 
>> Current:
>> Figure 10
>> Figure 15
> 
> I think that numbering of these figures is not needed.
> In RFC 7296 similar figures (Sections 2.14, 2.15) are not numbered.
> 
> 
>> Figure 16
>> Figure 24
>> Figure 27
> 
> This figures have titles. I believe they are listed here by mistake.
> 
> 
> Figure 23 has no title.
> Please add the following title:
> 
> NEW:
> Figure 23: Example of a KD Payload
> 
> 
> Figure 26 has no title.
> Please add the following title:
> 
> NEW:
> Figure 26: Key Paths for all GMs
> 
> 
> Figure 30 has no title.
> Please add the following title:
> 
> NEW:
> Figure 30: Key Paths for all GMs after Exclusion of a GM
> 
> 
>> Figure 31
> 
> Figure 31 is missing in the document. I believe it is listed here by mistake.
> 
> 
>> Tables 3-8
> 
> For Table 3 add the following title:
> 
> NEW:
> Table 3: Group Controller Authentication Method Transform IDs
> 
> 
> For Table 4 add the following title:
> 
> NEW:
> Table 4: Key Wrap Algorithm Transform IDs
> 
> 
> For Table 5 add the following title:
> 
> NEW:
> Table 5: GSA Attributes
> 
> 
> For Table 6 add the following title:
> 
> NEW:
> Table 6: GW Policy Attributes
> 
> 
> For Table 7 add the following title:
> 
> NEW:
> Table 7: Group Key Bag attributes
> 
> 
> For Table 8 add the following title:
> 
> NEW:
> Table 8: Member Key Bag attributes
> 
> 
>> Tables 11-25
> 
> I don't think these tables need titles. Looking at recent RFCs in IPsecME WG, 
> all tables in IANA considerations are untitled. I'd rather they don't have 
> numbers too,
> but as far as I know this is unavoidable for tables with the current xml2rfc 
> version :-)
> 
>> -->
> 
> 
>> 39) <!-- [rfced] Please review the "Inclusive Language" portion of the online
>> Style Guide <https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
>> and let us know if any changes are needed.  Updates of this nature typically
>> result in more precise language, which is helpful for readers.
>> 
>> For example, please consider whether the term "man-in-the-middle" should be
>> updated. -->
> 
> I believe we can use "person-in-the-middle" instead.
> I failed to find other issues with inclusive language guide in the text.

Alternatively, “On-Path Attack Protection”.

> 
> I also have some issues.
> 
> 40) Not all new IANA registries added to 
> https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml
> are properly filled in. In particular, the "Reserved for Private Use" ranges 
> in the "GSA Attributes",
> the "Group-wide Policy Attributes" and the "Member Key Bag Attributes" 
> registries do not
> reference to this document (while the "Group Key Bag Attributes" registry 
> does).
> 
> 41) A typo in Appendix A.3:
> 
> CURRENT:
>   If the GCKS performs a simple SA rekey without changing group
>   membership, it will only send a Group Key Gag in the KD payload with
>   a new SA key encrypted with the default KWK.
> 
> NEW:
>   If the GCKS performs a simple SA rekey without changing group
>   membership, it will only send a Group Key Bag in the KD payload with
>   a new SA key encrypted with the default KWK.
> 
> (should be "Key Bag" instead of "Key Gag").
> 
> 42) The draft incorrectly calls the GSA_REKEY pseudo-exchange
> as "GSA_REKEY exchange" in few places. This is the result of careless
> editing from my side, this is better to fix:
> 
> a) Section 4.5.2
> 
> CURRENT:
>   (*):  Multiple SA_KEY attributes may only appear for the GIKE_UPDATE
>      protocol in the GSA_REKEY exchange if the GCKS uses the group key
>      management method that allows excluding GMs from the group (like
>      LKH).
> 
> NEW:
>   (*):  Multiple SA_KEY attributes may only appear for the GIKE_UPDATE
>      protocol in the GSA_REKEY pseudo-exchange if the GCKS uses the group key
>      management method that allows excluding GMs from the group (like
>      LKH).
> 
> b) Section 4.5.2
> 
> CURRENT:
>   In the GSA_REKEY
>   exchange, at least one SA_KEY attribute MUST be present, and more
>   attributes MAY be present (depending on the key management method
>   employed by the GCKS).
> 
> NEW:
>   In the GSA_REKEY
>   pseudo-exchange, at least one SA_KEY attribute MUST be present, and more
>   attributes MAY be present (depending on the key management method
>   employed by the GCKS).
> 
> 
> c) Section 4.5.3.3
> 
> CURRENT:
>   This attribute MUST NOT appear in the rekey operations (in the
>   GSA_REKEY or GSA_INBAND_REKEY exchanges).
> 
> NEW:
>   This attribute MUST NOT appear in the rekey operations (in the
>   GSA_REKEY pseudo-exchange or in the GSA_INBAND_REKEY exchange).
> 
> 
> d) Section 5 (see also item 32)
> 
> CURRENT:
>   (2):  For a Data-Security SA, exactly one SA_KEY attribute MUST be
>         present.  For a Rekey SA, one SA_KEY attribute MUST be present
>         in all cases and more these attributes MAY be present in a
>         GSA_REKEY exchange.
> 
> NEW:
>   (2):  For a Data-Security SA, exactly one SA_KEY attribute MUST be
>         present.  For a Rekey SA, one SA_KEY attribute MUST be present
>         in all cases and more these attributes MAY be present in a
>         GSA_REKEY pseudo-exchange.
> 
> 
> e) Section 5
> 
> CURRENT:
>        The AUTH_KEY attribute MUST be present in the
>         GSA_REKEY exchange if the GCKS employs an authentication method
>         based on digital signatures and wants to change the public key
>         for the following multicast rekey operations.
> 
> NEW:
>         The AUTH_KEY attribute MUST be present in the
>         GSA_REKEY pseudo-exchange if the GCKS employs an authentication method
>         based on digital signatures and wants to change the public key
>         for the following multicast rekey operations.
> 
> 
> 43) Section 1, typo, missing hyphen in "pseudo-exchange".
> 
> CURRENT:
>   Refreshing the group keys can be performed either in a unicast mode
>   via the GSA_INBAND_REKEY exchange (Section 2.4.2) performed over a
>   specific IKE SA between a GM and a GCKS or in a multicast mode with
>   the GSA_REKEY pseudo exchange (Section 2.4.1) when new keys are being
>   distributed to all GMs.
> 
> NEW:
>   Refreshing the group keys can be performed either in a unicast mode
>   via the GSA_INBAND_REKEY exchange (Section 2.4.2) performed over a
>   specific IKE SA between a GM and a GCKS or in a multicast mode with
>   the GSA_REKEY pseudo-exchange (Section 2.4.1) when new keys are being
>   distributed to all GMs.
> 
> 
> 44) Please change "Generic Payload" to "generic payload" (make lowercase)
> to match RFC 7296 (2 instances in the document - in Sections 4.4 and 4.5).
> 
> 
> 45) Please change "Payload Header" to "payload header" (make lowercase)
> to match RFC 7296 (1 instance in Section 2.4.1.1.)
> 
> 
> 46) Section 4.4
> 
> CURRENT:
>   The GSA payload is used by the GCKS to assert security attributes for
>   both Rekey and Data-Security SAs.
> 
> NEW:
>   The Group Security Association (GSA) payload is used by the GCKS to assert 
> security attributes for
>   both Rekey and Data-Security SAs.
> 
> 
> 47) Section 4.4
> 
> CURRENT:
>   The Security Association payload fields are defined as follows:
> 
> NEW:
>   The Group Security Association payload fields are defined as follows:

I did not detect any additional issues. Many thanks to all of you for your fine 
updates.

Thanks,
Brian

> 
> 
> I also have a proposal. The draft references 
> draft-ietf-ipsecme-ikev2-qr-alt-10,
> which is currently in the RFC Editor queue in the state "AUTH48".
> While it is only informatively referenced, I think that it would be better if 
> it is referenced
> as RFC and not as I-D. Can you please make this possible (I think it would 
> require adding
> draft-ietf-ipsecme-ikev2-qr-alt-10 to C532 cluster).
> 
> Regards,
> Valery.
> 
> 
>> Thank you.
>> 
>> Madison Church and Karen Moore
>> RFC Production Center
>> 
>> 
>> On Sep 11, 2025, at 7:14 PM, RFC Editor via auth48archive 
>> <[email protected]> wrote:
>> 
>> *****IMPORTANT*****
>> 
>> Updated 2025/09/11
>> 
>> RFC Author(s):
>> --------------
>> 
>> Instructions for Completing AUTH48
>> 
>> Your document has now entered AUTH48.  Once it has been reviewed and
>> approved by you and all coauthors, it will be published as an RFC.
>> If an author is no longer available, there are several remedies
>> available as listed in the FAQ (https://www.rfc-editor.org/faq/).
>> 
>> You and you coauthors are responsible for engaging other parties
>> (e.g., Contributors or Working Group) as necessary before providing
>> your approval.
>> 
>> Planning your review
>> ---------------------
>> 
>> Please review the following aspects of your document:
>> 
>> *  RFC Editor questions
>> 
>>  Please review and resolve any questions raised by the RFC Editor
>>  that have been included in the XML file as comments marked as
>>  follows:
>> 
>>  <!-- [rfced] ... -->
>> 
>>  These questions will also be sent in a subsequent email.
>> 
>> *  Changes submitted by coauthors
>> 
>>  Please ensure that you review any changes submitted by your
>>  coauthors.  We assume that if you do not speak up that you
>>  agree to changes submitted by your coauthors.
>> 
>> *  Content
>> 
>>  Please review the full content of the document, as this cannot
>>  change once the RFC is published.  Please pay particular attention to:
>>  - IANA considerations updates (if applicable)
>>  - contact information
>>  - references
>> 
>> *  Copyright notices and legends
>> 
>>  Please review the copyright notice and legends as defined in
>>  RFC 5378 and the Trust Legal Provisions
>>  (TLP – https://trustee.ietf.org/license-info).
>> 
>> *  Semantic markup
>> 
>>  Please review the markup in the XML file to ensure that elements of
>>  content are correctly tagged.  For example, ensure that <sourcecode>
>>  and <artwork> are set correctly.  See details at
>>  <https://authors.ietf.org/rfcxml-vocabulary>.
>> 
>> *  Formatted output
>> 
>>  Please review the PDF, HTML, and TXT files to ensure that the
>>  formatted output, as generated from the markup in the XML file, is
>>  reasonable.  Please note that the TXT will have formatting
>>  limitations compared to the PDF and HTML.
>> 
>> 
>> Submitting changes
>> ------------------
>> 
>> To submit changes, please reply to this email using ‘REPLY ALL’ as all
>> the parties CCed on this message need to see your changes. The parties
>> include:
>> 
>>  *  your coauthors
>> 
>>  *  [email protected] (the RPC team)
>> 
>>  *  other document participants, depending on the stream (e.g.,
>>     IETF Stream participants are your working group chairs, the
>>     responsible ADs, and the document shepherd).
>> 
>>  *  [email protected], which is a new archival mailing list
>>     to preserve AUTH48 conversations; it is not an active discussion
>>     list:
>> 
>>    *  More info:
>>       
>> https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc
>> 
>>    *  The archive itself:
>>       https://mailarchive.ietf.org/arch/browse/auth48archive/
>> 
>>    *  Note: If only absolutely necessary, you may temporarily opt out
>>       of the archiving of messages (e.g., to discuss a sensitive matter).
>>       If needed, please add a note at the top of the message that you
>>       have dropped the address. When the discussion is concluded,
>>       [email protected] will be re-added to the CC list and
>>       its addition will be noted at the top of the message.
>> 
>> You may submit your changes in one of two ways:
>> 
>> An update to the provided XML file
>> — OR —
>> An explicit list of changes in this format
>> 
>> Section # (or indicate Global)
>> 
>> OLD:
>> old text
>> 
>> NEW:
>> new text
>> 
>> You do not need to reply with both an updated XML file and an explicit
>> list of changes, as either form is sufficient.
>> 
>> We will ask a stream manager to review and approve any changes that seem
>> beyond editorial in nature, e.g., addition of new text, deletion of text,
>> and technical changes.  Information about stream managers can be found in
>> the FAQ.  Editorial changes do not require approval from a stream manager.
>> 
>> 
>> Approving for publication
>> --------------------------
>> 
>> To approve your RFC for publication, please reply to this email stating
>> that you approve this RFC for publication.  Please use ‘REPLY ALL’,
>> as all the parties CCed on this message need to see your approval.
>> 
>> 
>> Files
>> -----
>> 
>> The files are available here:
>>  https://www.rfc-editor.org/authors/rfc9838.xml
>>  https://www.rfc-editor.org/authors/rfc9838.html
>>  https://www.rfc-editor.org/authors/rfc9838.pdf
>>  https://www.rfc-editor.org/authors/rfc9838.txt
>> 
>> Diff file of the text:
>>  https://www.rfc-editor.org/authors/rfc9838-diff.html
>>  https://www.rfc-editor.org/authors/rfc9838-rfcdiff.html (side by side)
>> 
>> Diff of the XML:
>>  https://www.rfc-editor.org/authors/rfc9838-xmldiff1.html
>> 
>> 
>> Tracking progress
>> -----------------
>> 
>> The details of the AUTH48 status of your document are here:
>>  https://www.rfc-editor.org/auth48/rfc9838
>> 
>> Please let us know if you have any questions.
>> 
>> Thank you for your cooperation,
>> 
>> RFC Editor
>> 
>> --------------------------------------
>> RFC9838 (draft-ietf-ipsecme-g-ikev2-23)
>> 
>> Title            : Group Key Management using IKEv2
>> Author(s)        : V. Smyslov, B. Weis
>> WG Chair(s)      : Yoav Nir, Tero Kivinen
>> 
>> Area Director(s) : Deb Cooley, Paul Wouters
>> 
>> 
>> --
>> auth48archive mailing list -- [email protected]
>> To unsubscribe send an email to [email protected]
> 

-- 
auth48archive mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to