Paul Hoffman writes:
> Based on Pasi's AD review, the authors significantly shortened the
> document. It seems prudent to have the WG review the new, shorter
> version. In particular, it would be good for developers to look at
> the new short document and see if it is complete enough to implement
> from. 
> 
> This review cycle will end in a week, but please do the review early
> in case problems are found. 

The draft looks good, but I would clarify the security considerations
section a bit. Now it says:

   Security considerations explained in section 7 of [RFC3686] are
   entirely relevant for this draft also.  The security considerations
   on fresh keys and integrity protection in section 7 of [RFC3686] are
   totally applicable on using AES-CTR in IKEv2; see [RFC3686] for
   details.  Due to this reasons, static keys are never used for the IKE
   SA and the IKE_SA always uses integrity protection.

The last paragraph is bit misleading, as there is no way static keys
can be used in IKE SA at all, and this is not because of the issues of
AES-CTR. Also integrity protection is already mandatory for IKEv2 IKE
SA regardless whether AES-CTR is used or not. It would be better to
replace the last sentence with:

   As static keys are never used in IKEv2 for IKE_SA and integrity
   protection is mandatory for IKE_SA, these issues are not applicable
   for AES-CTR in IKEv2 when protecting IKE_SA.
-- 
kivi...@iki.fi
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to