Skip to main content

Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2)
draft-ietf-ipsec-ikev2-algorithms-05

Yes

(Jon Peterson)
(Russ Housley)
(Steven Bellovin)

No Objection

(Alex Zinin)
(Allison Mankin)
(Bert Wijnen)
(Bill Fenner)
(David Kessens)
(Margaret Cullen)

Note: This ballot was opened for revision 05 and is now closed.

Jon Peterson Former IESG member
Yes
Yes () Unknown

                            
Russ Housley Former IESG member
(was Discuss, Yes) Yes
Yes () Unknown

                            
Steven Bellovin Former IESG member
Yes
Yes () Unknown

                            
Alex Zinin Former IESG member
No Objection
No Objection () Unknown

                            
Allison Mankin Former IESG member
No Objection
No Objection () Unknown

                            
Bert Wijnen Former IESG member
No Objection
No Objection () Unknown

                            
Bill Fenner Former IESG member
No Objection
No Objection () Unknown

                            
David Kessens Former IESG member
No Objection
No Objection () Unknown

                            
Harald Alvestrand Former IESG member
No Objection
No Objection (2004-04-01) Unknown
draft-ietf-ipsec-ui-suites was reviewed by John Loughney, Gen-ART.
He pointed out that this document does NOT define an IANA registry for suite names, and that it's extremely unclear how (or if) suite names should be "registered" in the future.
Given the amount of "reservation" of the strings "VPN-A" and "VPN-B" the document tries to do, that's odd.
Complete review entered as a document comment.
Margaret Cullen Former IESG member
No Objection
No Objection () Unknown

                            
Scott Hollenbeck Former IESG member
No Objection
No Objection (2004-03-25) Unknown
I would suggest expanding the UI acronym on first use in draft-ietf-ipsec-ui-suites.
Ted Hardie Former IESG member
No Objection
No Objection (2004-03-31) Unknown
The comment below on MUST- and SHOULD- was discussed further with Paul
Hoffman, and my comment has been addressed; being left in the record for
completeness.

In algorithms, MUST- and SHOULD- are defined but not used.  I can see the need for completeness
with SHOULD+, but given the unwieldy nature of these terms, it's a bit unfortunate.
Could these be defined when needed, after some experience with whether 
SHOULD+ helps?

I believe it would be useful the suites document to suggest a name for
the IANA registry.

NITS:
In UI suites, section 2:

This section lists optional, non-mandatory suites that be presented to

-->may be presented?

In UI suites, Section 2.2

This suite is what many people expect the commonly-used corporate VPN
security that will be used within a few years of the time this document
is being written.

-->This suite is what many people expect the commonly-used coporate VPN
security profile wil be within a few years of the time of this document's
publication?
Thomas Narten Former IESG member
(was Discuss) No Objection
No Objection (2004-04-05) Unknown
In draft-ietf-ipsec-ikev2-algorithms-04.txt

The scope of this document could be a bit clearer, i.e, that the
transforms are about IKE, and not IPsec.

Rewording suggestion. Change:

> The Internet Key Exchange protocol provides for the negotiation of
> cryptographic algorithms between both end points of a cryptographic
> association. Different implementations of IPSec and IKE may provide
> different algorithms. However the IETF desires that all implementations
> should have some way to interoperate. This requires that some set of
> algorithms be specified as "mandatory to implement."

To something like:

The Internet Key Exchange protocol provides for the negotiation of
cryptographic algorithms between both end points of a cryptographic
association. Different implementations of IPSec and IKE may provide
different algorithms. However the IETF desires that all
implementations should have some way to interoperate. In particular,
this requires that IKE define a set of mandatory-to-implement
algorithms, since IKE itself uses such algorithms as part of its own
negotiations. This requires that some set of algorithms be specified
as "mandatory to implement" for IKE.


> Exchange (IKE [RFC2409] and IKEv2 [IKEv2]) provide a mechanism to
> negotiate which algorithms should be used in any even association.

what does "in any even association" mean?

> is necessary to specify a set of mandatory to implement algorithms to

mandatory-to-implement (multiple places)

> available. This document defines the current set of mandatory to
> implement algorithms for use of IKEv2 as well as specifying algorithms
> that should be implemented because they made be promoted to mandatory
> at some future time.

what does it mean "for use of"? to allow IKEv2 itself to negotiate
phase II? Suggested reword:

This document defines the current set of algorithms that are mandatory
to implement as part of IKEv2, as well as algorithms that should be
implemented because they may be promoted to mandatory at some future
time.


> There are several MODP groups that are defined for use in IKEv2. They

expand/define MODP?