HI William,
(as the shepherd of this document) Thank you Deb for your review.
I agree with all these comments.
One suggestion for this one:
> Appendix A, last paragraph: 'PPK stuff', maybe 'PPK messages'?
I wonder if “messages” is the correct word as it means the whole request or
response packet to me.
Maybe ‘the PPK related payloads can be piggybacked with other payloads ’?
Thank you for this proposed text, I’ll use it.
Regards,
Valery.
Regards & Thanks!
Wei PAN (潘伟)
From: Deb Cooley <[email protected]>
Sent: Friday, March 7, 2025 4:41 AM
To: [email protected]
Cc: [email protected]; [email protected]
Subject: [IPsec] AD comments on draft-ietf-ipsecme-ikeve-qr-alt
Thanks to Valery for writing this draft, apologies for the delay. I was hoping
to beat the I-D submission cutoff, but I didn't make it.
I did spend some time mapping out the differences in how the key development
works in all three versions: RFC 7296, RFC8784 and this draft. They are
related, but different in all three places. I think I see why it is done the
way it is, including a way to rekey the SA without tearing down the whole
connection. [I'm happy take comments from those whose crypt background is less
rusty than my own.]
Specific comments: We might need to work on these a bit. Most are readability
comments.
Abstract, para 2: Remove the word 'Besides,'. Last sentence, change to, 'This
specification defines a way to use PPKs in active IVKv2 SAs for creating
additional IPsec SAs and rekey operations. (I'm not sure how much this helps,
it is pretty awkward.)
Introduction, para 1, sentence 2, 4, last phrase: add/change some text to make
it flow better, 'An extension...', 'post-quantum security is defined', 'IPsec
traffic that mostly needs protecting, (albeit it wouldn't provide protection of
the identity of the peers).
Introduction, para 3, QKD sentence: 'for example via the use of Quantum Key
Distribution (QKD).
Section 3.1.1, para 2, first sentence: I don't understand this sentence,
'computed differently compared to use PPKs'... maybe 'computed differently to
how PPKs are used in IKE_AUTH', but I'm not sure.
Section 3.2, para 1: 'peers MAY use this PPK' to 'peers MAY use this fresh
PPK'.
Section 3.2, Figure 2: What is 'Nir'? Maybe a typo for 'Nr'? Or something
else.
Appendix A, last paragraph: 'PPK stuff', maybe 'PPK messages'?
General: There are a handful of pointers back to the g-ikev2 draft. Just be
sure that the naming that was changed late in the process has made it into this
draft. For example, GSA_AUTH - I don't remember if that was new, old, or
unchanged.
Deb
_______________________________________________
IPsec mailing list -- [email protected]
To unsubscribe send an email to [email protected]