Using Counter Modes with Encapsulating Security Payload (ESP) and Authentication Header (AH) to Protect Group Traffic
draft-ietf-msec-ipsec-group-counter-modes-06
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
06 | (System) | post-migration administrative database adjustment to the No Objection position for Sean Turner |
2010-09-15
|
06 | Cindy Morgan | State changed to RFC Ed Queue from Approved-announcement sent by Cindy Morgan |
2010-09-15
|
06 | (System) | IANA Action state changed to No IC from In Progress |
2010-09-15
|
06 | (System) | IANA Action state changed to In Progress |
2010-09-15
|
06 | Cindy Morgan | IESG state changed to Approved-announcement sent |
2010-09-15
|
06 | Cindy Morgan | IESG has approved the document |
2010-09-15
|
06 | Cindy Morgan | Closed "Approve" ballot |
2010-09-10
|
06 | (System) | New version available: draft-ietf-msec-ipsec-group-counter-modes-06.txt |
2010-08-27
|
06 | (System) | Removed from agenda for telechat - 2010-08-26 |
2010-08-26
|
06 | Cindy Morgan | State changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation by Cindy Morgan |
2010-08-26
|
06 | Sean Turner | [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss by Sean Turner |
2010-08-26
|
06 | Alexey Melnikov | [Ballot Position Update] Position for Alexey Melnikov has been changed to No Objection from Discuss by Alexey Melnikov |
2010-08-26
|
06 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu |
2010-08-26
|
06 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica |
2010-08-25
|
06 | Sean Turner | [Ballot comment] #1: Sec 2: It is the basis for several modes of operation that combine encryption, including CCM and GCM. combine with what? … [Ballot comment] #1: Sec 2: It is the basis for several modes of operation that combine encryption, including CCM and GCM. combine with what? I assume you mean "combine authentication with encryption, including CCM and GCM." |
2010-08-25
|
06 | Sean Turner | [Ballot discuss] This one is a DISCUSS-DISCUSS (i.e., no action required for authors). I'd like to understand why this counter mode ID is on standards … [Ballot discuss] This one is a DISCUSS-DISCUSS (i.e., no action required for authors). I'd like to understand why this counter mode ID is on standards track when the last one (draft-ietf-ipsecme-aes-ctr-ikev2) had to go through as informational. These are regular DISCUSSes: #2: From SECDIR review: Please add a normative reference to draft-ietf-msec-gdoi-update-06 that references how to distribute the SIDs. #3: Section 4: If the entire set of sender identifiers has been exhausted, the GKMS MUST refuse to allow new group members to join. If the GKMS got in this situation by using a small SID wouldn't another idea be to switch to a bigger SID? This obviously wouldn't work for the 16 but would for the 8 and 12 bit SIDs. |
2010-08-25
|
06 | Sean Turner | [Ballot Position Update] New position, Discuss, has been recorded by Sean Turner |
2010-08-25
|
06 | Ralph Droms | [Ballot Position Update] New position, No Objection, has been recorded by Ralph Droms |
2010-08-25
|
06 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded by Adrian Farrel |
2010-08-24
|
06 | Jari Arkko | [Ballot comment] A review by Ari Keränen: 4. Group Key Management Conventions o When a GKMS determines that a particular group member is … [Ballot comment] A review by Ari Keränen: 4. Group Key Management Conventions o When a GKMS determines that a particular group member is no longer a part of the group, then it MAY re-allocate any sender identifier associated with that group member for use with new group member. In this case, the GKMS MUST first delete and replace any active AH or ESP SAs with which the SID may have been used. How does the "delete and replace" happen in practice if the GKMS is a different entity than the one with the active AH or SA? A GKMS MUST support a group member notifying the GCKS that its IV space will soon be exhausted and requires a new SA to be distributed. A group member SHOULD notify the GCKS in advance of its IV space being exhausted. A GCKS MAY choose to ignore this notification based on policy (e.g., if the group member appears to be asking for new SAs so frequent as to negatively affect group communications). Ignoring the IV space exhaustion notifications probably has some security implications worth noting in the security considerations sections. |
2010-08-24
|
06 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko |
2010-08-24
|
06 | Robert Sparks | [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks |
2010-08-24
|
06 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley |
2010-08-24
|
06 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded by Stewart Bryant |
2010-08-23
|
06 | David Harrington | [Ballot comment] I support Alexey's DISCUSS. "MUST support" is ambiguous. and the following SHOULD/MAY combination is so loose, it is unclear what a compliant implementation … [Ballot comment] I support Alexey's DISCUSS. "MUST support" is ambiguous. and the following SHOULD/MAY combination is so loose, it is unclear what a compliant implementation MUST support. |
2010-08-23
|
06 | David Harrington | [Ballot Position Update] New position, No Objection, has been recorded by David Harrington |
2010-08-23
|
06 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert |
2010-08-21
|
06 | Alexey Melnikov | [Ballot discuss] This is a fine document, but I have one question: 4. Group Key Management Conventions A GKMS MUST support a group member … [Ballot discuss] This is a fine document, but I have one question: 4. Group Key Management Conventions A GKMS MUST support a group member notifying the GCKS that its IV space will soon be exhausted and requires a new SA to be distributed. Excuse my ignorance of the subject, but I would like to understand how this MUST can be achieved and whether any protocol extensions are needed to implement this requirement. A group member SHOULD notify the GCKS in advance of its IV space being exhausted. A GCKS MAY choose to ignore this notification based on policy (e.g., if the group member appears to be asking for new SAs so frequent as to negatively affect group communications). |
2010-08-21
|
06 | Alexey Melnikov | [Ballot discuss] This is a fine document, but I have one question: 4. Group Key Management Conventions A GKMS MUST support a group member … [Ballot discuss] This is a fine document, but I have one question: 4. Group Key Management Conventions A GKMS MUST support a group member notifying the GCKS that its IV space will soon be exhausted and requires a new SA to be distributed. Excuse my ignorance of the subject, but I would like to understand how this MUST can be achieved and if any protocol extensions are needed to implement this requirement. A group member SHOULD notify the GCKS in advance of its IV space being exhausted. A GCKS MAY choose to ignore this notification based on policy (e.g., if the group member appears to be asking for new SAs so frequent as to negatively affect group communications). |
2010-08-21
|
06 | Alexey Melnikov | [Ballot Position Update] New position, Discuss, has been recorded by Alexey Melnikov |
2010-08-20
|
06 | Tim Polk | [Ballot Position Update] New position, Yes, has been recorded for Tim Polk |
2010-08-20
|
06 | Tim Polk | Ballot has been issued by Tim Polk |
2010-08-20
|
06 | Tim Polk | Created "Approve" ballot |
2010-08-17
|
06 | Tim Polk | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Tim Polk |
2010-08-17
|
06 | Tim Polk | Placed on agenda for telechat - 2010-08-26 by Tim Polk |
2010-08-17
|
06 | Tim Polk | [Note]: 'Vincent Roca (vincent.roca@inria.fr) is the document shepherd.' added by Tim Polk |
2010-07-23
|
06 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2010-07-15
|
06 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Sam Hartman. |
2010-07-12
|
06 | Amanda Baber | IANA comments: IANA understands that, upon approval of this document, there are no IANA Actions that need to be completed. |
2010-07-11
|
06 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Sam Hartman |
2010-07-11
|
06 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Sam Hartman |
2010-07-09
|
06 | Amy Vezza | Last call sent |
2010-07-09
|
06 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2010-07-09
|
06 | Tim Polk | Last Call was requested by Tim Polk |
2010-07-09
|
06 | (System) | Ballot writeup text was added |
2010-07-09
|
06 | (System) | Last call text was added |
2010-07-09
|
06 | (System) | Ballot approval text was added |
2010-07-09
|
06 | Tim Polk | State Changes to Last Call Requested from Publication Requested by Tim Polk |
2010-04-09
|
06 | Amy Vezza | (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he … (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Vincent Roca is the shepherd. I have reviewed this document. I think it's ready for IESG review. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? Yes, reviews received from: Alfred Hoenes (-04 version, Jan 2010) 2nd WG LC Sheela Rowles (-02 version, Jan 2009) 1st WG LC David L. Black (-02 version, Dec 2008) 1st WG LC George Gross (individual I-D, Feb 2007) Those reviews are fine and the main comments addressed as far as I can tell. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization, or XML? No. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. After having read the document, I don't have any major comment. I'll just send an email to the authors (with you in CC) with a few very minor comments. There's no IPR disclosure. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There seems to be a WG consensus. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/.) Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type, and URI type reviews? If the document does not already indicate its intended status at the top of the first page, please indicate the intended status here. Yes, I've checked nits. There's an easy to correct issue regarding the boilerplate version (from Sept 2009), and document may lack a disclaimer for pre-RFC5378 work. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. There's a normative/informative split that seems appropriate, and no particular normative dependency. (1.i) Has the Document Shepherd verified that the document's IANA Considerations section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC2434]. If the document describes an Expert Review process, has the Document Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during IESG Evaluation? No IANA section and no need for any such section. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? Non applicable. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. Working Group Summary Was there anything in the WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type, or other Expert Review, what was its course (briefly)? In the case of a Media Type Review, on what date was the request posted? Personnel Who is the Document Shepherd for this document? Who is the Responsible Area Director? If the document requires IANA experts(s), insert 'The IANA Expert(s) for the registries in this document are .' Technical Summary Counter modes have been defined for block ciphers such as the Advanced Encryption Standard (AES). Counter modes use a counter, which is typically assumed to be incremented by a single sender. This memo describes the use of counter modes when applied to the Encapsulating Security Payload (ESP) and Authentication Header (AH) in multiple-sender group applications. Working Group Summary One of the main comments received (Alfred Hoenes) concerns the need to make the proposal compatible with any AES-like block ciphers (it was previously restricted to AES). It has been addressed. There was no controversial issue. Document Quality The document is small and easy to read. I am not aware of the existence of an implementation but it's likely one will be done, if not already the case. Personnel Shepherd: Vincent Roca AD: Tim Polk |
2010-04-09
|
06 | Amy Vezza | Draft Added by Amy Vezza in state Publication Requested |
2010-04-09
|
06 | Amy Vezza | [Note]: 'Vincent Roca (vincent.roca@inria.fr) is the document shepherd.' added by Amy Vezza |
2010-03-03
|
05 | (System) | New version available: draft-ietf-msec-ipsec-group-counter-modes-05.txt |
2009-11-25
|
04 | (System) | New version available: draft-ietf-msec-ipsec-group-counter-modes-04.txt |
2009-09-06
|
06 | (System) | Document has expired |
2009-03-05
|
03 | (System) | New version available: draft-ietf-msec-ipsec-group-counter-modes-03.txt |
2008-06-09
|
02 | (System) | New version available: draft-ietf-msec-ipsec-group-counter-modes-02.txt |
2007-11-16
|
01 | (System) | New version available: draft-ietf-msec-ipsec-group-counter-modes-01.txt |
2007-02-26
|
00 | (System) | New version available: draft-ietf-msec-ipsec-group-counter-modes-00.txt |