and to really nail this down, NIST also agrees to AES-CCM.  Huzzah!

Deb

On Fri, Sep 26, 2025 at 11:50 AM Deb Cooley <[email protected]> wrote:

> I checked with the author of RFC 4309 who prefers the hyphen.  So AES-CCM,
> please.
>
> Deb
>
> On Fri, Sep 26, 2025 at 10:24 AM Deb Cooley <[email protected]> wrote:
>
>> I'm going to make some inquiries (to authors and NIST), like Valery, this
>> looks very strange.  If one or the other is correct, I'm going to pick
>> that...
>>
>> Stay tuned.
>>
>> Deb
>>
>> On Fri, Sep 26, 2025 at 9:48 AM Madison Church <
>> [email protected]> wrote:
>>
>>> Hi Valery and Brian, *Debbie,
>>>
>>> Thank you both for your replies and patience as we incorporate your
>>> requested changes! We have updated the document and have a few followup
>>> questions/comments inline (for easy readability, we have only included
>>> outstanding questions in this thread).
>>>
>>> *Debbie - As responsible AD for this document, please see question 14
>>> and let us know if you approve the change made to the first sentence in
>>> Section 2.5. The change may be viewed in this diff file:
>>> https://www.rfc-editor.org/authors/rfc9838-diff.html.
>>>
>>> >>> 4) <!-- [rfced] Please review whether any of the notes in this
>>> document
>>> >>> should be in the <aside> element. It is defined as "a container for
>>> >>> content that is semantically less important or tangential to the
>>> >>> content that surrounds it" (
>>> https://authors.ietf.org/en/rfcxml-vocabulary#aside).
>>> >>> -->
>>> >>
>>> >> I'm not sure I understand the visual effect of <aside> element (I
>>> guess this is an xml2rfc v3 feature).
>>> >> Can you point me to RFCs that use this element?
>>> >>
>>> >> And do you have some parts of this document in mind that
>>> >> this element can be useful for?
>>>
>>> 1) Depending on author preference, we will occasionally use <aside> for
>>> text marked as "Note:". The output yields a visual of indented text with a
>>> vertical line on the left. For example, RFCs 9800 [1] and 9801 [2] utilize
>>> the <aside> element frequently.
>>>
>>> As for areas in this document that may benefit from the <aside>, the
>>> last sentence of Section 1 (Introduction and Overview) contains a note.
>>>
>>> [1]: https://www.rfc-editor.org/rfc/rfc9800.txt
>>> [2]: https://www.rfc-editor.org/rfc/rfc9801.txt
>>>
>>> >>> 14) <!-- [rfced] We have updated this sentence to use "AES CCM" (per
>>> >>> RFC 4309) rather than "AES-CCM". Please let us know any
>>> >>> objections.
>>> >>>
>>> >>> Original:
>>> >>>   Several counter-based modes of operation have been specified for
>>> ESP
>>> >>>   (e.g., AES-CTR [RFC3686], AES-GCM [RFC4106], AES-CCM [RFC4309],
>>> >>>   ChaCha20-Poly1305 [RFC7634], AES-GMAC [RFC4543]) and AH (e.g., AES-
>>> >>>   GMAC [RFC4543]).
>>> >>>
>>> >>> Current:
>>> >>>   Several counter-based modes of operation have been specified for
>>> ESP
>>> >>>   (e.g., AES-CTR [RFC3686], AES-GCM [RFC4106], AES CCM [RFC4309],
>>> >>>   ChaCha20-Poly1305 [RFC7634], and AES-GMAC [RFC4543]) and AH (e.g.,
>>> AES-
>>> >>>   GMAC [RFC4543]).
>>> >>> -->
>>> >>
>>> >> Hmm, obviously, I should have no objections to this as RFC 4309 uses
>>> this form
>>> >> but actually this is a big surprise for me: the lack of consistency
>>> in naming :-)
>>> >>
>>> >> And a number of RFCs related to IPsec (I suspect there are others
>>> too) actually use "AES-CCM" form
>>> >> (RFC8247, RFC7321). Thus, I have no position and rely on AD's
>>> decision on this.
>>> >>
>>> >>> 22) <!-- [rfced] May we restructure the text below as follows for
>>> readability?
>>> >>>
>>> >>> Current:
>>> >>>   This transform ID defines the following properties.  Sequence
>>> numbers
>>> >>>   are 32-bit in size and are transmitted in the Sequence Number
>>> field of AH and
>>> >>>   ESP packets.  The value of sequence numbers is not guaranteed to
>>> be unique for
>>> >>>   the duration of an SA, thus they are not suitable for replay
>>> protection.  This
>>> >>>   transform ID MUST be used by the GCKS in case of multi-sender
>>> multicast
>>> >>>   Data-Security SAs utilizing protocols ESP or AH to inform the GMs
>>> that the
>>> >>>   replay protection is not expected to be possible.  The GCKS MAY
>>> also use this
>>> >>>   transform ID for single-sender multicast Data-Security SAs if
>>> replay
>>> >>>   protection is not needed (e.g. it is done on application level).
>>> >>>
>>> >>>
>>> >>> Perhaps:
>>> >>>   This transform ID defines the following properties:
>>> >>>
>>> >>>   * Sequence numbers are 32 bits in size and are transmitted in the
>>> Sequence
>>> >>>     Number field of AH and ESP packets.
>>> >>>
>>> >>>   * The value of sequence numbers is not guaranteed to be unique for
>>> >>>     the duration of an SA, thus they are not suitable for replay
>>> >>>     protection.
>>> >>>
>>> >>>   * This transform ID MUST be used by the GCKS in the case of
>>> multi-sender
>>> >>>     multicast Data-Security SAs utilizing protocols ESP or AH to
>>> inform
>>> >>>     the GMs that the replay protection is not expected to be
>>> possible.
>>> >>>
>>> >>>   * The GCKS MAY also use this transform ID for single-sender
>>> multicast
>>> >>>     Data-Security SAs if replay protection is not needed (e.g., it
>>> is done
>>> >>>     on the application level).
>>> >>> -->
>>> >>
>>> >> Actually, only two first bullet define the properties, the last two
>>> >> just explain how to use this transform ID. I propose instead the
>>> following
>>> >> variants.
>>> >>
>>> >> Option A - split para and do not add list:
>>> >>
>>> >> NEW (Option A):
>>> >>   This transform ID defines the
>>> >>   following properties.  Sequence numbers are 32 bits in size and are
>>> >>   transmitted in the Sequence Number field of AH and ESP packets.  The
>>> >>   value of sequence numbers is not guaranteed to be unique for the
>>> >>   duration of an SA, thus they are not suitable for replay protection.
>>> >>
>>> >>   This transform ID MUST be used by the GCKS in case of multi-sender
>>> >>   multicast Data-Security SAs utilizing protocols ESP or AH to inform
>>> >>   the GMs that the replay protection is not expected to be possible.
>>> >>   The GCKS MAY also use this transform ID for single-sender multicast
>>> >>   Data-Security SAs if replay protection is not needed (e.g., it is
>>> >>   done on the application level).
>>> >>
>>> >> Option B - use list for properties only:
>>> >>
>>> >> NEW (Option B):
>>> >>    This transform ID defines the following properties:
>>> >>
>>> >>    * Sequence numbers are 32 bits in size and are transmitted in the
>>> Sequence
>>> >>      Number field of AH and ESP packets.
>>> >>
>>> >>    * The value of sequence numbers is not guaranteed to be unique for
>>> >>      the duration of an SA, thus they are not suitable for replay
>>> >>      protection.
>>> >>
>>> >>   This transform ID MUST be used by the GCKS in case of multi-sender
>>> >>   multicast Data-Security SAs utilizing protocols ESP or AH to inform
>>> >>   the GMs that the replay protection is not expected to be possible.
>>> >>   The GCKS MAY also use this transform ID for single-sender multicast
>>> >>   Data-Security SAs if replay protection is not needed (e.g., it is
>>> >>   done on the application level).
>>> >>
>>> >> I have no preferences, but perhaps option B looks a bit neater.
>>> >
>>> > I’m fine with either of Valery’s proposals but also prefer Option B.
>>>
>>> 2) Thank you for your proposal! We have updated the document to use
>>> Option B.
>>>
>>> >>> 39) <!-- [rfced] Please review the "Inclusive Language" portion of
>>> the online
>>> >>> Style Guide <
>>> https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
>>> >>> and let us know if any changes are needed.  Updates of this nature
>>> typically
>>> >>> result in more precise language, which is helpful for readers.
>>> >>>
>>> >>> For example, please consider whether the term "man-in-the-middle"
>>> should be
>>> >>> updated. -->
>>> >>
>>> >> I believe we can use "person-in-the-middle" instead.
>>> >> I failed to find other issues with inclusive language guide in the
>>> text.
>>> >
>>> > Alternatively, “On-Path Attack Protection”.
>>>
>>> 3) We have updated to use "on-path attack protection" (as this is a
>>> common replacement for "man-in-the-middle").
>>>
>>> >> 40) Not all new IANA registries added to
>>> https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml
>>> >> are properly filled in. In particular, the "Reserved for Private Use"
>>> ranges in the "GSA Attributes",
>>> >> the "Group-wide Policy Attributes" and the "Member Key Bag
>>> Attributes" registries do not
>>> >> reference to this document (while the "Group Key Bag Attributes"
>>> registry does).
>>>
>>> 4) Thank you for pointing this out! We will ask IANA to update these
>>> registries. We will also ask them to correct the "Unassigned" range in
>>> Table 13 (as mentioned in mail from 9/24).
>>>
>>> >> I also have a proposal. The draft references
>>> draft-ietf-ipsecme-ikev2-qr-alt-10,
>>> >> which is currently in the RFC Editor queue in the state "AUTH48".
>>> >> While it is only informatively referenced, I think that it would be
>>> better if it is referenced
>>> >> as RFC and not as I-D. Can you please make this possible (I think it
>>> would require adding
>>> >> draft-ietf-ipsecme-ikev2-qr-alt-10 to C532 cluster).
>>>
>>> 5) Understood! As of right now, the document is cited as
>>> [IPSEC-IKEV2-QR-ALT] in the text. Would you like to update to use [RFC9867]?
>>>
>>> The files have been posted here (please refresh):
>>>    https://www.rfc-editor.org/authors/rfc9838.txt
>>>    https://www.rfc-editor.org/authors/rfc9838.pdf
>>>    https://www.rfc-editor.org/authors/rfc9838.html
>>>    https://www.rfc-editor.org/authors/rfc9838.xml
>>>
>>> Diff files:
>>>    https://www.rfc-editor.org/authors/rfc9838-diff.html
>>>    https://www.rfc-editor.org/authors/rfc9838-rfcdiff.html (side by
>>> side)
>>>    https://www.rfc-editor.org/authors/rfc9838-auth48diff.html
>>>    https://www.rfc-editor.org/authors/rfc9838-auth48rfcdiff.html  (side
>>> by side)
>>>
>>> For the AUTH48 status page, please see:
>>> https://www.rfc-editor.org/auth48/rfc9838.
>>>
>>> Thank you!
>>>
>>> Madison Church
>>> RFC Editor
>>>
>>> >> Regards,
>>> >> Valery.
>>> >>
>>> >>
>>> >>> Thank you.
>>> >>>
>>> >>> Madison Church and Karen Moore
>>> >>> RFC Production Center
>>> >>>
>>> >>>
>>> >>> On Sep 11, 2025, at 7:14 PM, RFC Editor via auth48archive <
>>> [email protected]> wrote:
>>> >>>
>>> >>> *****IMPORTANT*****
>>> >>>
>>> >>> Updated 2025/09/11
>>> >>>
>>> >>> RFC Author(s):
>>> >>> --------------
>>> >>>
>>> >>> Instructions for Completing AUTH48
>>> >>>
>>> >>> Your document has now entered AUTH48.  Once it has been reviewed and
>>> >>> approved by you and all coauthors, it will be published as an RFC.
>>> >>> If an author is no longer available, there are several remedies
>>> >>> available as listed in the FAQ (https://www.rfc-editor.org/faq/).
>>> >>>
>>> >>> You and you coauthors are responsible for engaging other parties
>>> >>> (e.g., Contributors or Working Group) as necessary before providing
>>> >>> your approval.
>>> >>>
>>> >>> Planning your review
>>> >>> ---------------------
>>> >>>
>>> >>> Please review the following aspects of your document:
>>> >>>
>>> >>> *  RFC Editor questions
>>> >>>
>>> >>>  Please review and resolve any questions raised by the RFC Editor
>>> >>>  that have been included in the XML file as comments marked as
>>> >>>  follows:
>>> >>>
>>> >>>  <!-- [rfced] ... -->
>>> >>>
>>> >>>  These questions will also be sent in a subsequent email.
>>> >>>
>>> >>> *  Changes submitted by coauthors
>>> >>>
>>> >>>  Please ensure that you review any changes submitted by your
>>> >>>  coauthors.  We assume that if you do not speak up that you
>>> >>>  agree to changes submitted by your coauthors.
>>> >>>
>>> >>> *  Content
>>> >>>
>>> >>>  Please review the full content of the document, as this cannot
>>> >>>  change once the RFC is published.  Please pay particular attention
>>> to:
>>> >>>  - IANA considerations updates (if applicable)
>>> >>>  - contact information
>>> >>>  - references
>>> >>>
>>> >>> *  Copyright notices and legends
>>> >>>
>>> >>>  Please review the copyright notice and legends as defined in
>>> >>>  RFC 5378 and the Trust Legal Provisions
>>> >>>  (TLP – https://trustee.ietf.org/license-info).
>>> >>>
>>> >>> *  Semantic markup
>>> >>>
>>> >>>  Please review the markup in the XML file to ensure that elements of
>>> >>>  content are correctly tagged.  For example, ensure that <sourcecode>
>>> >>>  and <artwork> are set correctly.  See details at
>>> >>>  <https://authors.ietf.org/rfcxml-vocabulary>.
>>> >>>
>>> >>> *  Formatted output
>>> >>>
>>> >>>  Please review the PDF, HTML, and TXT files to ensure that the
>>> >>>  formatted output, as generated from the markup in the XML file, is
>>> >>>  reasonable.  Please note that the TXT will have formatting
>>> >>>  limitations compared to the PDF and HTML.
>>> >>>
>>> >>>
>>> >>> Submitting changes
>>> >>> ------------------
>>> >>>
>>> >>> To submit changes, please reply to this email using ‘REPLY ALL’ as
>>> all
>>> >>> the parties CCed on this message need to see your changes. The
>>> parties
>>> >>> include:
>>> >>>
>>> >>>  *  your coauthors
>>> >>>
>>> >>>  *  [email protected] (the RPC team)
>>> >>>
>>> >>>  *  other document participants, depending on the stream (e.g.,
>>> >>>     IETF Stream participants are your working group chairs, the
>>> >>>     responsible ADs, and the document shepherd).
>>> >>>
>>> >>>  *  [email protected], which is a new archival mailing
>>> list
>>> >>>     to preserve AUTH48 conversations; it is not an active discussion
>>> >>>     list:
>>> >>>
>>> >>>    *  More info:
>>> >>>
>>> https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc
>>> >>>
>>> >>>    *  The archive itself:
>>> >>>       https://mailarchive.ietf.org/arch/browse/auth48archive/
>>> >>>
>>> >>>    *  Note: If only absolutely necessary, you may temporarily opt out
>>> >>>       of the archiving of messages (e.g., to discuss a sensitive
>>> matter).
>>> >>>       If needed, please add a note at the top of the message that you
>>> >>>       have dropped the address. When the discussion is concluded,
>>> >>>       [email protected] will be re-added to the CC list
>>> and
>>> >>>       its addition will be noted at the top of the message.
>>> >>>
>>> >>> You may submit your changes in one of two ways:
>>> >>>
>>> >>> An update to the provided XML file
>>> >>> — OR —
>>> >>> An explicit list of changes in this format
>>> >>>
>>> >>> Section # (or indicate Global)
>>> >>>
>>> >>> OLD:
>>> >>> old text
>>> >>>
>>> >>> NEW:
>>> >>> new text
>>> >>>
>>> >>> You do not need to reply with both an updated XML file and an
>>> explicit
>>> >>> list of changes, as either form is sufficient.
>>> >>>
>>> >>> We will ask a stream manager to review and approve any changes that
>>> seem
>>> >>> beyond editorial in nature, e.g., addition of new text, deletion of
>>> text,
>>> >>> and technical changes.  Information about stream managers can be
>>> found in
>>> >>> the FAQ.  Editorial changes do not require approval from a stream
>>> manager.
>>> >>>
>>> >>>
>>> >>> Approving for publication
>>> >>> --------------------------
>>> >>>
>>> >>> To approve your RFC for publication, please reply to this email
>>> stating
>>> >>> that you approve this RFC for publication.  Please use ‘REPLY ALL’,
>>> >>> as all the parties CCed on this message need to see your approval.
>>> >>>
>>> >>>
>>> >>> Files
>>> >>> -----
>>> >>>
>>> >>> The files are available here:
>>> >>>  https://www.rfc-editor.org/authors/rfc9838.xml
>>> >>>  https://www.rfc-editor.org/authors/rfc9838.html
>>> >>>  https://www.rfc-editor.org/authors/rfc9838.pdf
>>> >>>  https://www.rfc-editor.org/authors/rfc9838.txt
>>> >>>
>>> >>> Diff file of the text:
>>> >>>  https://www.rfc-editor.org/authors/rfc9838-diff.html
>>> >>>  https://www.rfc-editor.org/authors/rfc9838-rfcdiff.html (side by
>>> side)
>>> >>>
>>> >>> Diff of the XML:
>>> >>>  https://www.rfc-editor.org/authors/rfc9838-xmldiff1.html
>>> >>>
>>> >>>
>>> >>> Tracking progress
>>> >>> -----------------
>>> >>>
>>> >>> The details of the AUTH48 status of your document are here:
>>> >>>  https://www.rfc-editor.org/auth48/rfc9838
>>> >>>
>>> >>> Please let us know if you have any questions.
>>> >>>
>>> >>> Thank you for your cooperation,
>>> >>>
>>> >>> RFC Editor
>>> >>>
>>> >>> --------------------------------------
>>> >>> RFC9838 (draft-ietf-ipsecme-g-ikev2-23)
>>> >>>
>>> >>> Title            : Group Key Management using IKEv2
>>> >>> Author(s)        : V. Smyslov, B. Weis
>>> >>> WG Chair(s)      : Yoav Nir, Tero Kivinen
>>> >>>
>>> >>> Area Director(s) : Deb Cooley, Paul Wouters
>>> >>>
>>> >>>
>>> >>> --
>>> >>> auth48archive mailing list -- [email protected]
>>> >>> To unsubscribe send an email to [email protected]
>>>
>>
-- 
auth48archive mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to