Hey Valery, Thanks for the clarification, we'll add this statement in the draft!
Just because I'm interested: For me, this seems to be a general problem for implementing counter ciphers in multicast scenarios, regardless of implicit-iv or not. Do you know how the IV is usually chosen in multicast-implementations? Maybe we could add a recommendation in the draft. Thanks Tobias -----Ursprüngliche Nachricht----- Von: IPsec [mailto:ipsec-boun...@ietf.org] Im Auftrag von Valery Smyslov Gesendet: Montag, 10. Oktober 2016 09:06 An: Daniel Migault <daniel.miga...@ericsson.com>; IPsecME WG <ipsec@ietf.org> Betreff: Re: [IPsec] FW: New Version Notification fordraft-mglt-ipsecme-implicit-iv-01.txt Hi Daniel, I think you should add a text in the Security Considerations that these transforms MUST NOT be used in situations where there is a chance that Sequence Numbers repeat. The most prominent example where it can happen - multicast ESP SA with multiple senders. Regards, Valery. > Hi, > > Based on the feed backs and the discussions from the previous IETF, > see the updated version of our draft. We believe the document is in good shape to become a WG document. > > Feel free to support the draft and as usually, comments are welcome! > > BR, > Daniel > > -----Original Message----- > From: internet-dra...@ietf.org [mailto:internet-dra...@ietf.org] > Sent: Saturday, October 08, 2016 7:15 PM > To: Tobias Guggemos <tobias.gugge...@gmail.com>; Yoav Nir > <ynir.i...@gmail.com>; Daniel Migault <daniel.miga...@ericsson.com> > Subject: New Version Notification for > draft-mglt-ipsecme-implicit-iv-01.txt > > > A new version of I-D, draft-mglt-ipsecme-implicit-iv-01.txt > has been successfully submitted by Daniel Migault and posted to the IETF repository. > > Name: draft-mglt-ipsecme-implicit-iv > Revision: 01 > Title: Implicit IV for Counter-based Ciphers in IPsec Document date: > 2016-10-08 > Group: Individual Submission > Pages: 6 > URL: https://www.ietf.org/internet-drafts/draft-mglt-ipsecme-implicit-iv-01.txt > Status: https://datatracker.ietf.org/doc/draft-mglt-ipsecme-implicit-iv/ > Htmlized: https://tools.ietf.org/html/draft-mglt-ipsecme-implicit-iv-01 > Diff: https://www.ietf.org/rfcdiff?url2=draft-mglt-ipsecme-implicit-iv-01 > > Abstract: > IPsec ESP sends an initialization vector (IV) or nonce in each > packet, adding 8 or 16 octets. Some algorithms such as AES-GCM, AES- > CCM, AES-CTR and ChaCha20-Poly1305 require a unique nonce but do not > require an unpredictable nonce. When using such algorithms the > packet counter value can be used to generate a nonce, saving 8 octets > per packet. This document describes how to do this. > > > > > Please note that it may take a couple of minutes from the time of > submission until the htmlized version and diff are available at tools.ietf.org. > > The IETF Secretariat > > _______________________________________________ > IPsec mailing list > IPsec@ietf.org > https://www.ietf.org/mailman/listinfo/ipsec _______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec _______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec