Hi Valery,

Please see my comments below.

- Unclosed sentence in the abstract: "It may be used to preserve anonymity of"

- Reference to IKEv2: please use RFC 7296.

- 2.1: it may be trivial, but we want to add that the AUTH payload MUST be verified by the recipient.

- I don't think that we have consensus on "The Identification Data in Identity payload for the ID_NULL type MUST be absent". The asserted but unproven identity may be used for logging, or may be proven with a later authentication. Quoting from an email by Tero: "I think the most important point of this feature is that the client is UNAUTHENTICATED, not that it is ANONYMOUS."

- "If endpoint receives a request to create an unauthenticated IKE SA from the IP address, which is configured on the endpoint to be authenticated, the request SHOULD be rejected." - I don't see why. What if there are several peers behind an IP address, some authenticated and some not? Maybe we need to think some more about the policy that each of the peers should enforce.

- The issue of Traffic Selectors needs better treatment. Should we add a MUST for allocation of internal IP addresses?

Thanks,
        Yaron

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to