Great review. Thank you. Just some quick notes (Hoiidays through Oct 11 and I only have a few work hours until then and I got kicked out of my office as it is also a guest room; working in my NOC).

On 09/27/2012 12:27 AM, Henderson, Thomas R wrote:
I had another read through of 
http://datatracker.ietf.org/doc/draft-ietf-hip-rfc4423-bis/

I think it is nearly ready to publish; the main substantive comments that I 
have are:

1) Section 13 (Changes from RFC 4423) is incomplete as written; it should 
either be completed or deleted

What did I miss? :) Problem is I did it after changes and I am not good at remembering all I changed :( So if you can help me, great. If the concensus is to delete it, I gladly will.


2) it would be nice to describe how host identifiers are intended to be 
revoked/replaced over time.  However, the current text in Section 1 seems to be 
restrictive in this regard (more on this below).

Can add a few words here. It is almost an anything goes within a framework. A sensor will probably never get its HI revoked/replaced. Running out of counter is a good reason to r/r, or just on general principles.


3) it would be nice to go into a bit more detail of how HIP relates to multicast

And I am NOT well versed on multicast and would need help here. Basically we can have HIs for multicast, but what do we have in a multicast KMP? I guess I should read the RFC again!


Regarding whether it should be published as Informational or PS RFC, I don't 
have a strong opinion.  I guess I would lean towards Informational since it is 
not normative specification, but I would yield to whatever is best current 
practice in the IETF for documents such as these.

Same here. These sorts of RFCs have traditionally been informational. Don't know what the current IESG position is.


- Tom

Detailed comments below:


Section 1 (Introduction)

There is exactly one Host Identifier for each Host Identity.
This document does not talk about replacing Host Identifiers over time; should 
it?  Also, couldn't multiple keys be associated with the same Identity 
(computing stack)?  I wonder whether this statement is too restrictive, 
especially since one can imagine times in which keys are replaced and two Host 
Identifiers may be active at the same time.

Section 2 (Terminology)

(Public key)  Used as a publicly known identifier for cryptographic identity 
authentication.
Does it need to be publicly known?  See later "Unpublished Host Identifier" definition.   
Suggest "(typically publicly known)" instead.

Section 3 (Background)

IP numbers
suggest "IP addresses" instead (many places in this section)

Section 4 (Host Identity namespace)

As will be specified in the Host Identity Protocol Base EXchange (BEX) 
[RFC5201-bis] specification
Suggest instead:  "As specified in the Host Identity Protocol [RFC5201-bis] 
specification

Section 4.1 (Host Identifiers)

    The actual Host Identities are never directly used in any Internet 
protocols.
I believe that this should instead be Identifier (Identities are abstract).

Section 4.2 (Host Identity Hash)

It is possible to for the two Hosts in the HIP exchange to use different hashes.
Suggest "It is possible for the two hosts..."

Section 4.3 (Host Identity Tag)

s/perfers/prefers

Section 5 (New stack architecture)

As discussed above, the IP addresses can be seen to be a confounding of routing 
direction vectors and interface names.
Is it routing direction vectors, or endpoint (or stack) names?  Is "routing 
direction vector" terminology used elsewhere; if so, suggest to add a reference, if 
not, suggest to change to end-point names.

Section 7 (HIP and ESP)

As adding a new naming layer allows one to potentially add a new forwarding 
layer (see Section 9, below), it is very important that the HIP provides 
mechanisms for middlebox authentication.
Perhaps add reference to RFC 5207 here?

s/consistant/consistent

  It should be noted that there are already BITW implementations.
Perhaps a clarification here:  "It should be noted that there are already BITW 
implementations of HIP providing virtual private network (VPN) services."

Section 10 (Multicast)

    Since its inception, a few studies have looked at how HIP might affect 
IP-layer or application-layer multicast.
IMO, this section should be expanded with some more commentary about how HIP 
applies to multicast.  In particular, how amenable are multicast key management 
protocols and security associations to being able to leverage HIP?  Would HITs 
ever be put into source or destination address fields of multicast datagrams?

Section 13 (Changes from RFC 4423)

This section is not yet completed.  Either complete or delete.

Section 14 (Security considerations)

There are more details on this process in the Host Identity Protocol under 
development.
Suggest to strike "under development" since the HIP protocol has now been 
developed.

There has been no attempt to develop a secure method to issue the HIT 
revocation notice.
This is no longer true due to draft-irtf-hiprg-revocation-05; suggest to 
rephrase.







_______________________________________________
Hipsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/hipsec


_______________________________________________
Hipsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/hipsec

Reply via email to