Hi Yoav, 

Thank you. 

Please see inline.

Cheers,
Med

> -----Message d'origine-----
> De : Yoav Nir [mailto:[email protected]]
> Envoyé : jeudi 18 octobre 2018 19:11
> À : BOUCADAIR Mohamed TGI/OLN
> Cc : [email protected]
> Objet : Re: Yoav's Comments (was RE: [IPsec] Call for WG Adoptation for
> draft-boucadair-ipsecme-ipv6-ipv4-codes)
> 
> Hi.
> 
> RFC 7296 has the INTERNAL_ADDRESS_FAILURE notification as optional — gateways
> are free to just ignore the requests. However, having read 3.15.4 again, I
> see that the text does say “If the responder encounters an error while
> attempting to assign an IP address to the initiator during the processing of
> a Configuration payload, it responds with an INTERNAL_ADDRESS_FAILURE
> notification.”.  So I’m convinced. It does need to update 7296.

[Med] OK.

> 
> About RFC 5739, at the top of page 3 (and other places) of your draft you
> mention the initiator requesting IPv6 prefix(es). Requesting IPv6 prefixes is
> defined in RFC 7539, which concludes that the way this is defined in 3406
> (the predecessor of 7296) doesn’t work. I think 5739 should be referenced as
> informative.
> 

[Med] Requesting an IPv6 prefix is possible with RFC7296. It is true that an 
experimental RFC defines another way to proceed, but RFC5739 is already cited 
in RFC7296. As such, we don’t need IMO to repeat it here because, otherwise, we 
will need to add a similar note:

==
   Note that there is an additional document that discusses IPv6
   configuration in IKEv2, [IPV6CONFIG].  At the present time, it is an
   experimental document, but there is a hope that with more
   implementation experience, it will gain the same standards treatment
   as this document.
== 

> Yoav
> 
> > On 18 Oct 2018, at 12:49, [email protected] wrote:
> >
> > Hi Yoav,
> >
> > Can you please clarify which "stuff" in 5739 you are referring to?
> >
> > The draft updates RFC7296 because it updates the behavior specified in
> Section 3.15.4 of that RFC.
> >
> > Cheers,
> > Med
> >
> >> -----Message d'origine-----
> >> De : IPsec [mailto:[email protected]] De la part de Yoav Nir
> >> Envoyé : samedi 13 octobre 2018 15:48
> >> À : Tero Kivinen
> >> Cc : [email protected]
> >> Objet : Re: [IPsec] Call for WG Adoptation for draft-boucadair-ipsecme-
> ipv6-
> >> ipv4-codes
> >>
> >> I believe the final document should address the stuff in RFC 5739. Also,
> I’m
> >> not sure you need to update 7296 to add some new code points.
> >>
> >> Neither of these is a barrier for adoption.
> >>
> >> I have read the draft and support its adoption.
> >>
> >> Yoav
> >>
> >>> On 13 Oct 2018, at 3:09, Tero Kivinen <[email protected]> wrote:
> >>>
> >>> Our new charter has been approved and that includes item:
> >>>
> >>>   RFC7296 defines a generic notification code that is related to a
> >>>   failure to handle an internal address failure. That code does not
> >>>   explicitly allow an initiator to determine why a given address
> >>>   family is not assigned, nor whether it should try using another
> >>>   address family. The Working Group will specify a set of more
> >>>   specific notification codes that will provide sufficient
> >>>   information to the IKEv2 initiator about the encountered failure.
> >>>   A possible starting pointing is
> >>>   draft-boucadair-ipsecme-ipv6-ipv4-codes.
> >>>
> >>> So this email will start one week long WG adoptation call for that
> >>> document [1] for WG adoptation.
> >>>
> >>> Send your comments to this list before the 2018-10-21.
> >>>
> >>> [1] https://datatracker.ietf.org/doc/draft-boucadair-ipsecme-ipv6-ipv4-
> >> codes/
> >>> --
> >>> [email protected]
> >>>
> >>> _______________________________________________
> >>> IPsec mailing list
> >>> [email protected]
> >>> https://www.ietf.org/mailman/listinfo/ipsec
> >>
> >> _______________________________________________
> >> IPsec mailing list
> >> [email protected]
> >> https://www.ietf.org/mailman/listinfo/ipsec

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to