Last Call Review of draft-ietf-ipsecme-implicit-iv-07
review-ietf-ipsecme-implicit-iv-07-secdir-lc-nystrom-2019-10-14-00
Request | Review of | draft-ietf-ipsecme-implicit-iv |
---|---|---|
Requested revision | No specific revision (document currently at 11) | |
Type | Last Call Review | |
Team | Security Area Directorate (secdir) | |
Deadline | 2019-10-07 | |
Requested | 2019-09-23 | |
Authors | Daniel Migault , Tobias Guggemos , Yoav Nir | |
I-D last updated | 2019-10-14 | |
Completed reviews |
Secdir Last Call review of -07
by Magnus Nystrom
(diff)
Genart Last Call review of -07 by Joel M. Halpern (diff) |
|
Assignment | Reviewer | Magnus Nystrom |
State | Completed | |
Review |
review-ietf-ipsecme-implicit-iv-07-secdir-lc-nystrom-2019-10-14
|
|
Posted at | https://mailarchive.ietf.org/arch/msg/secdir/BCV1Q8sl5E__Hn9PU-q5JdUM3rk | |
Reviewed revision | 07 (document currently at 11) | |
Result | Has nits | |
Completed | 2019-10-13 |
review-ietf-ipsecme-implicit-iv-07-secdir-lc-nystrom-2019-10-14-00
I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. This document defines a mechanism to save on bandwidth in ESP connections when certain ciphers have been negotiated by using implicit IVs. The savings are limited to 8 bytes for the current version of this document. - Section 2 mentions AES-CCM, AES-CTR, AES-GCM and ChaCha. For all of these ciphers, an 8-byte nonce is used. The mechanism to make the IV implicit is by coupling it to the sequence number. Yet, Section 4 gives two examples of sequence numbers, one of 4 bytes and one of 8 bytes. This is confusing, presumably only the extended sequence number is usable? - Also, while the Abstract says the memo offers a mechanism to save on the explicit IV also for AES-CTR, and Section 2 includes AES-CTR in its description, Section 4 explicitly states that only AES-CCM, AES-GCM and ChaCha are subject of the optimization in this memo. This is also confusing. Why including AES-CTR in the memo at all if it isn't covered? At the very least it seems the Abstract should be updated. - It would be very helpful and useful to include an example of a handshake with an IIV and the resulting IV in an Appendix; this could assist implementors to get things right. (Editorial: English grammar needs some updates/reviews) Thanks, -- Magnus