Hi Paul, Thanks very much for your suggestion. I've updated the 06 version based on your changes. The draft looks much simpler now.
Regards & Thanks! Wei Pan > -----Original Message----- > From: Paul Wouters [mailto:paul.wout...@aiven.io] > Sent: Monday, July 12, 2021 11:35 AM > To: Panwei (William) <william.pan...@huawei.com> > Cc: ipsec@ietf.org > Subject: Re: [IPsec] I-D Action: > draft-kampati-ipsecme-ikev2-sa-ts-payloads-opt-05.txt > > On Mon, 5 Jul 2021, Panwei (William) wrote: > > Hi Wei Pan, > > > According to the discussion on the mailing list, I update the draft to > version 05. In this version, I deleted the unnecessary considerations for the > configuration changes. For now, the solution is very simple and just > includes the negotiation at creating IKE SAs and optimization at rekeying > IKE and Child SAs. > > > > Comments and feedbacks are more than welcome. > > It is lookger much better and simpler, but I still had a few issues and wanted > to make the document a bit shorter and clearer. I made some changes for > your consideration. I've attached an updated xml and txt file in case you > would like to use my changes. The changes are: > > - Reduced the text that was used to explain a lot of IKEv2 basics. > > Instead, a reference to IKEv2 should be enough. This greatly simplifies the > text. > > - Remove the parts about "changed configuration". > > If the crypto parameters have changed, you SHOULD NOT use REKEY. RFC > 7296 says this: > > In Section 2.8, "Note that, when rekeying, the new Child SA MAY have > different Traffic Selectors and algorithms than the old one" was > changed to "Note that, when rekeying, the new Child SA SHOULD NOT > have different Traffic Selectors and algorithms than the old one". > > So if the configuration has changed, you should not do any kind of REKEY, > whether it is OPTIMIZED or not. You should do a re-authentication (in other > words, a new IKE from scratch) > > - IKE REKEY MUST contain KE, because RFC 7296 says: > > The main reason for rekeying the IKE SA is to ensure that the > compromise of old keying material does not provide information > about > the current keys, or vice versa. Therefore, implementations MUST > perform a new Diffie-Hellman exchange when rekeying the IKE SA. In > other words, an initiator MUST NOT propose the value "NONE" for the > Diffie-Hellman transform, and a responder MUST NOT accept such a > proposal. This means that a successful exchange rekeying the IKE SA > always includes the KEi/KEr payloads. > > - Removed: It also helps to avoid IP fragmentation of IKEv2 messages > > I don't think this is actually true, since on rekey there are no required CERT > payloads, which is the vast majority of the payload size in IKE_AUTH that > causes fragmentation. > > - Changed MINIMUM_REKEY{_SUPPORTED} to > OPTIMIZED_REKEY{_SUPPORTED} > > This matches better with the OPTIMIZED_REKEY notify. Also, I find that > "minimum" is a little confusing. It could mean "minimum lifetime" or > "minimum of the previous one". I find "optimized" covers this better than > "minium". > > - Shortened titles > > For improved readability of Table of Contents > > - Some grammar and style > > Open questions to the working group: > > 1) Should the SUPPORTED notify mean that peers MAY use this method or > MUST > use this method? There could be a use for making it MUST, as a peer > could then eventually stop supporting the "old method". Initiators > would know by the lack of the notify that they might not be able to > rekey in the old way, and must add/delete or re-auth the SA. > > 2) Alternatively, the SUPPORTED notify could have a payload that signifies > whether the old method is supported or not. > > 3) Should we look at supporting rekeying multiple Child SAs at once? Or > should we tell people they should have used additional Traffic > Selectors and combined the Child SAs into one ? > > 4) When a Child SA was negotiated with PFS, what should an optimized > rekey > do when there is no KE payload? Send INVALID_KE_PAYLOAD ? > > > Paul > > > > > > > Regards & Thanks! > > Wei Pan > > > >> -----Original Message----- > >> From: I-D-Announce [mailto:i-d-announce-boun...@ietf.org] On > Behalf > >> Of internet-dra...@ietf.org > >> Sent: Monday, July 5, 2021 12:24 PM > >> To: i-d-annou...@ietf.org > >> Subject: I-D Action: > >> draft-kampati-ipsecme-ikev2-sa-ts-payloads-opt-05.txt > >> > >> > >> A New Internet-Draft is available from the on-line Internet-Drafts > >> directories. > >> > >> > >> Title : IKEv2 Optional SA&TS Payloads in Child > >> Exchange > >> Authors : Sandeep Kampati > >> Wei Pan > >> Meduri S S Bharath > >> Meiling Chen > >> Filename : > >> draft-kampati-ipsecme-ikev2-sa-ts-payloads-opt-05.txt > >> Pages : 9 > >> Date : 2021-07-04 > >> > >> Abstract: > >> This document describes a method for reducing the size of the > >> Internet Key Exchange version 2 (IKEv2) exchanges at time of > rekeying > >> IKE SAs and Child SAs by removing or making optional of SA & TS > >> payloads. Reducing size of IKEv2 exchanges is desirable for low > >> power consumption battery powered devices. It also helps to > avoid IP > >> fragmentation of IKEv2 messages. > >> > >> > >> The IETF datatracker status page for this draft is: > >> https://datatracker.ietf.org/doc/draft-kampati-ipsecme-ikev2-sa-ts-pa > >> yloa > >> ds-opt/ > >> > >> There is also an htmlized version available at: > >> https://datatracker.ietf.org/doc/html/draft-kampati-ipsecme-ikev2-sa- > >> ts-p > >> ayloads-opt-05 > >> > >> A diff from the previous version is available at: > >> https://www.ietf.org/rfcdiff?url2=draft-kampati-ipsecme-ikev2-sa-ts-p > >> aylo > >> ads-opt-05 > >> > >> > >> Internet-Drafts are also available by anonymous FTP at: > >> ftp://ftp.ietf.org/internet-drafts/ > >> > >> > >> _______________________________________________ > >> I-D-Announce mailing list > >> i-d-annou...@ietf.org > >> https://www.ietf.org/mailman/listinfo/i-d-announce > >> Internet-Draft directories: http://www.ietf.org/shadow.html or > >> ftp://ftp.ietf.org/ietf/1shadow-sites.txt > > > > _______________________________________________ > > IPsec mailing list > > IPsec@ietf.org > > https://www.ietf.org/mailman/listinfo/ipsec > > _______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec