Integrity Check Value and Timestamp TLV Definitions for Mobile Ad Hoc Networks (MANETs)
draft-ietf-manet-rfc6622-bis-06
Yes
(Adrian Farrel)
No Objection
(Brian Haberman)
(Jari Arkko)
(Martin Stiemerling)
(Pete Resnick)
(Richard Barnes)
(Spencer Dawkins)
Note: This ballot was opened for revision 04 and is now closed.
Adrian Farrel Former IESG member
Yes
Yes
(for -04)
Unknown
Barry Leiba Former IESG member
No Objection
No Objection
(2013-08-12 for -04)
Unknown
A fine document, this. I have just two very minor comments about Section 1.1. which require no response. If you disagree with them, feel free to just set them aside: I found myself reading this sentence a couple of times as I tried to parse it: For the ICV TLV as well as repeating the specification of two type extensions, 0 and 1, it also specifies a new type extension, 2, in Section 12 of this document. May I suggest this alternative?: NEW For the ICV type, this document specifies a new type extension, 2 (see Section 12), in addition to including the original type extensions (0 and 1) from RFC 6622. END Minor organizational comment: The subsequent paragraph, which gives some explanation and rationale for type extension 2, seems to belong in Section 12 (or a subsection), rather than in the introduction. Maybe merge this into the last paragraph in 12.1.1, and get rid of it here?
Brian Haberman Former IESG member
No Objection
No Objection
(for -04)
Unknown
Jari Arkko Former IESG member
No Objection
No Objection
(for -04)
Unknown
Joel Jaeggli Former IESG member
No Objection
No Objection
(2013-08-14 for -04)
Unknown
I find myself concerned that the complexity and manageability considerations become more acute as this suite matures... Statements like, This architecture is a result of the observation that with respect to security in MANETs, "one size rarely fits all" and that MANET routing protocol deployment domains have varying security requirements ranging from "unbreakable" to "virtually none". do not give me confidence in the long term usability and interoperability of manet routing protol implementations that employ fully or partially mechanisms in 6622 or 6622-bis.
Martin Stiemerling Former IESG member
No Objection
No Objection
(for -04)
Unknown
Pete Resnick Former IESG member
No Objection
No Objection
(2013-08-15 for -04)
Unknown
Richard Barnes Former IESG member
No Objection
No Objection
(for -04)
Unknown
Sean Turner Former IESG member
(was Discuss)
No Objection
No Objection
(2013-11-29)
Unknown
Thanks for clearing up my discuss points.
Spencer Dawkins Former IESG member
No Objection
No Objection
(for -04)
Unknown
Stephen Farrell Former IESG member
(was Discuss, No Objection)
No Objection
No Objection
(2013-11-20)
Unknown
Thanks for handling my discuss about truncation. I didn't check the comments below vs. -06, but feel free to follow up if needed, or not. S - 12.1: You say the truncation should be as specified for the relevant function(s). I think you mean that each such function registered in the IANA registry MUST specify if truncation is allowed and to what length(s). Is that right? If so, putting it that way would probably be better. And in this case and for the -sec draft, since you've not specified any truncation for HMAC-SHA-256 then that means that all 256 bits must be used - right? - section 13: I think it'd be good to say that the expert SHOULD NOT approve registrations where ICVs can be truncated so as to make them vulnerable given the state of the art when the registration is requested. - Please consider the suggestions made in the secdir review [1] about naming and IANA. And for completeness I'll note that I did discuss the lack of AKM here with the authors and am ok with it, as per the justification in the olsrv2 draft (even though the secdir reviewer also properly noted this). [1] http://www.ietf.org/mail-archive/web/secdir/current/msg04080.html