Hi, all

As discussed in the room, we need some reviewers for the 
sdn-ipsec-flow-protection draft ([1])

While any comments on any part of the document are welcome, I would like people 
to concentrate on the following issues:
The YANG model in Appendix A
Some of the crypto seems obsolete (example: DES). We would get into trouble in 
SecDir review.  OTOH ChaCha20-Poly1305 is missing..
Some of the modes are obsolete (BEET)
KINK & IKEv1
The YANG model in Section 6
I think there’s a bit of TMI in there:  Not all fields in an IPsec 
implementation need to be sent from the controller (SA state, like “larval")
The interaction between Controller and NSF
There’s no way for the controller to retrieve NSF capabilities. What if the NSF 
does not implement rc5?  It’s fine if we say that the Controller knows in 
advance what the capabilities of each NSF are, but it should be stated.
ISTM like the Controller sends the private key and the certificate to the NSF. 
While this is a possible model, it is also quite common for private keys to be 
generated in the NSF and never leave the cryptographic boundary. I think this 
should be at least allowed.

Thanks to Paul Wouters and two others who volunteered to review. Substantive 
reviews will be rewarded with a beer in Prague.

Yoav

[1] https://tools.ietf.org/html/draft-ietf-i2nsf-sdn-ipsec-flow-protection-03 
<https://tools.ietf.org/html/draft-ietf-i2nsf-sdn-ipsec-flow-protection-03>
_______________________________________________
I2nsf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to