Authors,

While reviewing this document during AUTH48, please resolve (as necessary) the 
following questions, which are also in the source file.

1) <!-- [rfced] Document title and abbreviated title.

a) Please note that the document title has been updated as
follows. The abbreviation "IKEv2" has been expanded
per Section 3.6 of RFC 7322 ("RFC Style Guide"). 

Additionally, may we make the document title more concise by 
removing "IKE_INTERMEDIATE" and "CREATE_CHILD_SA", as they are 
not mentioned in the Abstract, and by potentially adding "PPK", 
which is mentioned in the Abstract? Please let us know if one 
of the suggestions below retains the intended meaning or if 
you prefer otherwise.

Original:
   Mixing Preshared Keys in the IKE_INTERMEDIATE and in the
   CREATE_CHILD_SA Exchanges of IKEv2 for Post-quantum Security

Current:
   Mixing Preshared Keys in the IKE_INTERMEDIATE and 
   CREATE_CHILD_SA Exchanges of the Internet Key Exchange
   Protocol Version 2 (IKEv2) for Post-Quantum Security

Perhaps A:
   Mixing Preshared Keys in Exchanges of the Internet 
   Key Exchange Protocol Version 2 (IKEv2) for 
   Post-Quantum Security

or
Perhaps B:
   Enhanced Use of Post-Quantum Preshared Keys (PPKs) in the
   Internet Key Exchange Protocol Version 2 (IKEv2) for 
   Post-Quantum Security

b) Please verify that the abbreviated title that spans the header 
of the PDF file still matches the document title.

Original/Current:
   Enhanced Use of PPKs in IKEv2
-->


2) <!-- [rfced] Sections 3.1 and 3.2: We're having trouble parsing "one
of the PPKs which IDs were sent" and "initiator's one". Would the
following match the intended meaning or is there another way this
can be written for clarity and consistency?

a) Section 3.1:

Original:
   1.  If the responder is configured with one of the PPKs which IDs
       were sent by the initiator and this PPK matches the initiator's
       one (based on the information from the PPK Confirmation field),
       then the responder selects this PPK and returns back its identity
       in the PPK_IDENTITY notification.

Perhaps:
   1.  If the responder is configured with a PPK that was among the 
       IDs sent by the initiator, and if this PPK matches the 
       initiator's PPK (based on the information from the PPK 
       Confirmation field), then the responder selects this PPK and 
       returns its identity in the PPK_IDENTITY notification.


b) Section 3.1:

Original
   2.  If the responder does not have any of the PPKs which IDs were
       sent by the initiator or it has some of the proposed PPKs, but
       their values mismatch the initiator's ones (based on the
       information from the PPK Confirmation field), and using PPK is
       mandatory for the responder, then it MUST return
       AUTHENTICATION_FAILED notification and abort creating the IKE SA.

Perhaps:
   2.  If the responder does not have any of the PPKs that were among 
       the IDs sent by the initiator, or if the responder has some of
       the proposed PPKs but their values are mismatched from the 
       initiator's PPKs (based on the information from the PPK 
       Confirmation field), and if using PPK is mandatory for the 
       responder, then it MUST return an AUTHENTICATION_FAILED 
       notification and abort creating the IKE SA.


c) Section 3.2:

Original:
   In case the responder does not support (or is not configured for)
   using PPKs in the CREATE_CHILD_SA exchange, or does not have any of
   the PPKs which IDs were sent by the initiator, or it has some of
   proposed PPKs, but their values mismatch the initiator's ones (based
   on the information from the PPK Confirmation field), then it does not
   include any PPK_IDENTITY notification in the response and new SA is
   created as defined in IKEv2 [RFC7296].

Perhaps:
   If the responder does not support (or is not configured for)
   using PPKs in the CREATE_CHILD_SA exchange or does not have any of
   the PPKs that were among the IDs sent by the initiator, or if the 
   responder has some of proposed PPKs but their values are mismatched 
   from the initiator's PPKs (based on the information from the PPK 
   Confirmation field), then it does not include any PPK_IDENTITY 
   notifications in the response, and new SA is created as defined in 
   IKEv2 [RFC7296].  


d) Section 3.2:

Original:
   If using PPKs in CREATE_CHILD_SA is mandatory for the responder and
   the initiator does not include any PPK_IDENTITY_KEY notification in
   the request or the responder does not have any of the PPKs which IDs
   were sent by the initiator, or it has some of proposed PPKs, but
   their values mismatch the initiator's ones (based on the information
   from the PPK Confirmation field), then the responder MUST return the
   NO_PROPOSAL_CHOSEN notification.

Perhaps:
   If using PPKs in CREATE_CHILD_SA is mandatory for the responder and
   the initiator does not include any PPK_IDENTITY_KEY notification in
   the request, or if the responder does not have any of the PPKs that 
   were among the IDs sent by the initiator, or if the responder has some 
   of the proposed PPKs but with mismatched values from the initiator's PPKs 
   (based on the information from the PPK Confirmation field), then the 
   responder MUST return the NO_PROPOSAL_CHOSEN notification.
-->


3) <!--[rfced] Is the use of the apostrophe in "SKEYSEED'" correct? We
ask as only "SKEYSEED" appears in RFCs 7296 and 8784. We note
that there are five instances in this document.

One example

Original:
   A new SKEYSEED' value is computed using the
   negotiated PPK and the most recently computed 
   SK_d key. 
-->


4) <!-- [rfced] We're having trouble parsing "impact of appearing a CRQC
to". Is "appearing" the preferred term, or could this sentence be
rephrased as shown below for clarity?

Original:
   Section 4 of [RFC9370] discusses the potential impact of appearing a
   CRQC to various cryptographic primitives used in IKEv2.

Perhaps:
   Section 4 of [RFC9370] discusses the potential impact of when a
   CRQC is accessible to various cryptographic primitives used in IKEv2.
-->


5) <!-- [rfced] Some author comments are present in the XML. Please confirm that
no updates related to these comments are outstanding. Note that the
comments will be deleted prior to publication.
-->


6) <!-- [rfced] FYI - We have added expansions for the following abbreviations
per Section 3.6 of RFC 7322 ("RFC Style Guide"). Please review each
expansion in the document carefully to ensure correctness.

 Security Parameter Index (SPI)
-->


7) <!-- [rfced] Please review the "Inclusive Language" portion of the online 
Style Guide <https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
and let us know if any changes are needed.  Updates of this nature typically
result in more precise language, which is helpful for readers.

Note that our script did not flag any words in particular, but this should 
still be reviewed as a best practice.
-->


Thank you.

Sarah Tarrant and Karen Moore
RFC Production Center


On Sep 18, 2025, at 6:04 PM, RFC Editor via auth48archive 
<[email protected]> wrote:

*****IMPORTANT*****

Updated 2025/09/18

RFC Author(s):
--------------

Instructions for Completing AUTH48

Your document has now entered AUTH48.  Once it has been reviewed and 
approved by you and all coauthors, it will be published as an RFC.  
If an author is no longer available, there are several remedies 
available as listed in the FAQ (https://www.rfc-editor.org/faq/).

You and you coauthors are responsible for engaging other parties 
(e.g., Contributors or Working Group) as necessary before providing 
your approval.

Planning your review 
---------------------

Please review the following aspects of your document:

*  RFC Editor questions

  Please review and resolve any questions raised by the RFC Editor 
  that have been included in the XML file as comments marked as 
  follows:

  <!-- [rfced] ... -->

  These questions will also be sent in a subsequent email.

*  Changes submitted by coauthors 

  Please ensure that you review any changes submitted by your 
  coauthors.  We assume that if you do not speak up that you 
  agree to changes submitted by your coauthors.

*  Content 

  Please review the full content of the document, as this cannot 
  change once the RFC is published.  Please pay particular attention to:
  - IANA considerations updates (if applicable)
  - contact information
  - references

*  Copyright notices and legends

  Please review the copyright notice and legends as defined in
  RFC 5378 and the Trust Legal Provisions 
  (TLP – https://trustee.ietf.org/license-info).

*  Semantic markup

  Please review the markup in the XML file to ensure that elements of  
  content are correctly tagged.  For example, ensure that <sourcecode> 
  and <artwork> are set correctly.  See details at 
  <https://authors.ietf.org/rfcxml-vocabulary>.

*  Formatted output

  Please review the PDF, HTML, and TXT files to ensure that the 
  formatted output, as generated from the markup in the XML file, is 
  reasonable.  Please note that the TXT will have formatting 
  limitations compared to the PDF and HTML.


Submitting changes
------------------

To submit changes, please reply to this email using ‘REPLY ALL’ as all 
the parties CCed on this message need to see your changes. The parties 
include:

  *  your coauthors

  *  [email protected] (the RPC team)

  *  other document participants, depending on the stream (e.g., 
     IETF Stream participants are your working group chairs, the 
     responsible ADs, and the document shepherd).

  *  [email protected], which is a new archival mailing list 
     to preserve AUTH48 conversations; it is not an active discussion 
     list:

    *  More info:
       
https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc

    *  The archive itself:
       https://mailarchive.ietf.org/arch/browse/auth48archive/

    *  Note: If only absolutely necessary, you may temporarily opt out 
       of the archiving of messages (e.g., to discuss a sensitive matter).
       If needed, please add a note at the top of the message that you 
       have dropped the address. When the discussion is concluded, 
       [email protected] will be re-added to the CC list and 
       its addition will be noted at the top of the message. 

You may submit your changes in one of two ways:

An update to the provided XML file
— OR —
An explicit list of changes in this format

Section # (or indicate Global)

OLD:
old text

NEW:
new text

You do not need to reply with both an updated XML file and an explicit 
list of changes, as either form is sufficient.

We will ask a stream manager to review and approve any changes that seem
beyond editorial in nature, e.g., addition of new text, deletion of text, 
and technical changes.  Information about stream managers can be found in 
the FAQ.  Editorial changes do not require approval from a stream manager.


Approving for publication
--------------------------

To approve your RFC for publication, please reply to this email stating
that you approve this RFC for publication.  Please use ‘REPLY ALL’,
as all the parties CCed on this message need to see your approval.


Files 
-----

The files are available here:
  https://www.rfc-editor.org/authors/rfc9867.xml
  https://www.rfc-editor.org/authors/rfc9867.html
  https://www.rfc-editor.org/authors/rfc9867.pdf
  https://www.rfc-editor.org/authors/rfc9867.txt

Diff file of the text:
  https://www.rfc-editor.org/authors/rfc9867-diff.html
  https://www.rfc-editor.org/authors/rfc9867-rfcdiff.html (side by side)

Diff of the XML: 
  https://www.rfc-editor.org/authors/rfc9867-xmldiff1.html


Tracking progress
-----------------

The details of the AUTH48 status of your document are here:
  https://www.rfc-editor.org/auth48/rfc9867

Please let us know if you have any questions.  

Thank you for your cooperation,

RFC Editor

--------------------------------------
RFC9867 (draft-ietf-ipsecme-ikev2-qr-alt-10)

Title            : Mixing Preshared Keys in the IKE_INTERMEDIATE and in the 
CREATE_CHILD_SA Exchanges of IKEv2 for Post-quantum Security
Author(s)        : V. Smyslov
WG Chair(s)      : Yoav Nir, Tero Kivinen

Area Director(s) : Deb Cooley, Paul Wouters


-- 
auth48archive mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to