Last Call Review of draft-ietf-tcpm-tcp-ao-crypto-
I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG. These comments were written primarily for the benefit of the
security area directors. Document editors and WG chairs should treat
these comments just like any other last call comments
This document specifies requirements on cryptographic algorithms to be
used in the TCP Authentication Option (TCP APO). It also specifies
some mandatory algorithms.
- The abstract does not mention that the document also specifies
requirements on future algorithms. IMO, it should.
(- Last paragraph is what prompted my comment on the abstract.)
- Suggest moving the note explaining the need to mandate two MAC
algorithms to the Security Considerations section as it does not
contain normative text but does contain security considerations.
- Section 220.127.116.11:
- It is a little surprising to see that the SHA-1-based MAC algorithm
is selected as the default one, given that this is a new specification
and the industry is moving away from SHA-1. C.f. the work on XML
Encryption 1.1 and XML Signature 1.1 that specificallly recommends
against use of SHA-1 in new applications.
- Section 6 (Security Considerations):
In the fourth paragraph, there is a discussion around the fact that
the document does not force use of a 16 octet key. I think it would be
useful to at least clearly state a recommended minimum key size.
- "between to endpoints" - "between two endpoints"?
- "fixed-length output lengths" -> "fixed-length output"?
- "will be that has" -> "will be that"?