On Wed, 20 Jan 2016, Daniel Migault wrote:

Please find the working version of version 03:
https://github.com/mglt/drafts/commit/40e6a1e0e99064b54a328e27f0c3d498c2c7164c
Feel free to provide comments.

+      <t>The recommendations of this document mostly target IKEv2 implementers 
as implementations needs to meet

Remove "mostly"?

implementations needs to meet both high security expectations as well as high 
interoperability between various vendors

"high interoperability" does not really work for me. How about "wide
interoperability" or industry-wide or "a wide range of
interoperability".


a user -> an user

Avoid the word "cipher suites" because it kind of has a TLS meaning. How
about safest algorithms ?

On the other hand, -> Although

+ <t>Group 22-24 or 1024-bit MODP Group with 160-bit and 2048-bit MODP Group with 224-256-bit Prime Order + Subgroup are exposed to synchronization or transcription attacks.</t>

I'd split this up. 1024-bit MODP Group is getting too weak to be
expected to provide a

Here are the recommendations -> Recommendations

lower than 2048 -> smaller than 2048

B) PKIX
Do we need something more ?

Maybe try and limit it and see the PKIX authenticatiom should use an
algorithm of equal of stronger security than the PRF/INTEG ?

C) Intended Audience:
Specifying the implementer vs users:

See above.

Perhaps after this bump the draft and ask the WG for feedback?

Paul

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to