Hi Paul,

> I tried to formulate and solve the issues discussed at the previous
> meeting. There was no clear outcome (based on rereading the minutes)
> so please check the changes and let the authors know if you disagree.

Thanks for the updates.  Some notes:

 * maybe clarify that IPCOMP_SUPPORTED is only sent and a MUST if IPComp
   was negotiated in the original Child SA.

   RFC 7296 explicitly states "These payloads MUST NOT occur in messages
   that do not contain SA payloads." with regards to IPCOMP_SUPPORTED.
   Is there any clarification required on that?

 * maybe add "incompatible proposal" as a reason for initiating a
   regular Child SA rekeying of the first SA (if the KE method used
   for IKE is not in the Child SA proposal).

   However, I'd honestly prefer if that was just the standardized
   behavior for the Child SA created with IKE_AUTH as we really don't
   know what KE methods the responder has in its Child SA proposal.  So
   just blindly assuming the IKE's KE methods will be accepted seems
   risky (in particular if multiple key exchanges were involved in
   creating the IKE SA).  That IKE SA's first KE method can still be
   preferred in the Child SA rekeying request if it's in the initiator's
   proposal (i.e. use it for the KE payload and list it as first
   method in the SA payload).  But if there is a mismatch, it seems
   easier to recover during a regular rekeying than blindly trying the
   IKE KE method, receiving an INVALID_KE_PAYLOAD and then having to
   initiate a regular rekeying all over anyway (if that's even an
   option, the draft currently doesn't explicitly say).

 * I'm still wondering why the critical bit has to be set for the
   OPTIMIZED_REKEY notify.  It's a regular Notify payload, so it MUST be
   understood by all IKEv2 implementations and setting the bit is
   basically redundant (the critical bit only concerns the payload type,
   not the contents such as the notify message type - it's also only
   allowed to be set in requests so making it an unconditional MUST like
   that violates RFC 7296 anyway).

Regards,
Tobias

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to