Skip to main content

Last Call Review of draft-ietf-lamps-cms-kemri-06
review-ietf-lamps-cms-kemri-06-opsdir-lc-dunbar-2023-10-25-00

Request Review of draft-ietf-lamps-cms-kemri
Requested revision No specific revision (document currently at 08)
Type Last Call Review
Team Ops Directorate (opsdir)
Deadline 2023-10-25
Requested 2023-10-11
Authors Russ Housley , John Gray , Tomofumi Okubo
I-D last updated 2023-10-25
Completed reviews Opsdir Last Call review of -06 by Linda Dunbar (diff)
Genart Last Call review of -06 by Gyan Mishra (diff)
Secdir Last Call review of -06 by Brian Weis (diff)
Artart Last Call review of -07 by Sean Turner (diff)
Assignment Reviewer Linda Dunbar
State Completed
Request Last Call review on draft-ietf-lamps-cms-kemri by Ops Directorate Assigned
Posted at https://mailarchive.ietf.org/arch/msg/ops-dir/JiGgwNgQqm_W0Lm9MUmYx0Mww5o
Reviewed revision 06 (document currently at 08)
Result Has nits
Completed 2023-10-25
review-ietf-lamps-cms-kemri-06-opsdir-lc-dunbar-2023-10-25-00
I have reviewed this document as part of the Ops area directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the Ops area directors.
Document editors and WG chairs should treat these comments just like any other
last-call comments.

Summary: this document defines conventions for the use of KEM algorithms by the
originator and recipients to encrypt and decrypt Cryptographic Message Syntax
content.

I think the document is written clear. However, I have some confusion in
reading through the document.

1. Section 1 says that KEM algorithm is a "Store-and-forward mechanism for
transporting random keying material to a recipient". Does it mean the
intermediate nodes simply forward the packets in the same way as any other IP
packets?  Are there any encryption algorithms that are not Store-and-Forward?

2. Is the "shared secret(ss)" only between the originator and the recipient? if
one node needs to send KEM algorithm to multiple recipients, does it mean that
the originator needs to keep multiple shared secret?

3. Section 1.3: it states that the version number is intended to avoid ASN.1
decode errors. Is there any reference on how ASN numbers are used for avoiding
ASN.1 decoding error?

4. Section 2 states that "The originator randomly generates the content
encryption key and all recipients obtain that key". How does originator
distribute the "encryption key to all recipients"?  is the distribution
encrypted?

5. Section 5 last paragraph: What does "accept salt" mean?

Nits: Section 1 first paragraph: "cryptographers have be specifying..." ->
cryptographers have been specifying...