Hi Valery,
Thanks a lot for quickly addressing my comments. Your proposed resolutions sound good to me.

Cheers
Suresh

On 03/13/2014 02:03 AM, Valery Smyslov wrote:
Hi Suresh,
thank you for the review. Please find my answers below.

    ----- Original Message -----
    *From:* Suresh Krishnan <mailto:[email protected]>
    *To:* [email protected]
    <mailto:[email protected]> ;
    General Area Review Team <mailto:[email protected]>
    *Sent:* Thursday, March 13, 2014 4:50 AM
    *Subject:* Gen-ART Last Call review of
    draft-ietf-ipsecme-ikev2-fragmentation-05

    I am the assigned Gen-ART reviewer for
    draft-ietf-ipsecme-ikev2-fragmentation-05

    For background on Gen-ART, please see the FAQ at
    <http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html>.

    Please resolve these comments along with any other Last Call
    comments you may receive.

    Summary: This draft is almost ready for publication as a Proposed
    Standard but I have some suggestions that the authors may like to
    consider.

    * Retransmission and duplication

    It is unclear how the receiver of the message deals with lost
    fragments that are retransmitted. If I understand correctly, the
    sender only knows that all the fragments did not get to the
    receiver, and has no knowledge about which fragments were not
    received. So it ends up retransmitting all the fragments.

Right.

    This means that the receiver needs to do some form of
    de-duplication. Are the duplicate fragments discarded on the
    receiver (without verification) or are they blindly written into a
    reassembly buffer (after verification)? The difference is pretty
    significant because there is a authentication step involved for each
    fragment.

Duplicated fragments are discarded without verification. It is described
in Section 2.6, second bullet:

    o  Check, that this IKE Fragment Message is new for the receiver and
       not a replay.  If IKE Fragment message with the same Message ID,
       same Fragment Number and same Total Fragments fields was already
       received and successfully processed, this message is considered a
       replay and MUST be silently discarded.

Note, that this check takes place before verifying fragment authenticity
(next bullet).

If you think this text is unclear, could you please suggest how to
improve it?

    * IPv6 payload length

    I find this text to be a bit handwavy

    “   For IPv6 this estimation is difficult as there may be varying IPv6

        Extension headers included.”

    I think it would be preferable to at least estimate for the case
    where there are no extension headers. Suggest adding some text like
    this (Feel free to modify/ignore)

    NEW:

        For IPv6 Encrypted Payload content size is less than IP Datagram
    size

        by the sum of the following values in the case where there are no

        extension :

        o  IPv6 header size (40 bytes)

        o  UDP header size (8 bytes)

        o  non-ESP marker size (4 bytes if present)

        o  IKE Header size (28 bytes)

        o  Encrypted Payload header size (4 bytes)

        o  IV size (varying)

        o  padding and its size (at least 1 byte)

        o  ICV size (varying)

        The sum may be estimated as 81..85 bytes + IV + ICV + padding.

        If extension headers are present, the payload content size is
    further

        reduced by the sum of the size of the extension headers. The
    length of

        each extension header can be calculated as 8 * (Hdr Ext Len) bytes

        except for the fragment header which is always 8 bytes in length.

Thank you, I'll use it.

    * Editorial

    Appendix A:

    s/forgeg/forged/

    s/ reassempling/reassembly/

Thanks,

Valery.

    Thanks

    Suresh


_______________________________________________
Gen-art mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to