Hi all,

The node requirements draft was reviewed by the IESG.  Here are
the main points raised, arranged by reviewer.

The big issue I see is about upgrading IKE to a SHOULD.  

I'll try to start addressing the points after Christmas, but feel
free to discuss it already.

Set 1:

> I'm astonished that Path MTU is a MAY -- I had thought it was 
> a MUST.  I'd really like some more text explaining what some 
> of the many exceptions are that are alluded to here.
> 
> For Section 8, RFCs 2401, 2402, and 2406 are currently being 
> revised by the IPsec group; that should be mentioned.
> 
> The crypto algorithm requirements should be better aligned 
> with recommendations from the IPsec wg.  There's a draft that 
> lists 3DES as SHOULD, not MAY.
> 
> I think that IKEv? should be a SHOULD, not a MAY.  While the 
> IESG hasn't yet seen draft-bellovin-mandate-keymgmt, it will 
> soon and it describes automated key management as a "strong 
> SHOULD".  That's certainly the consensus in the security area.
> 
> More generically, I don't think that this WG should 
> standardize weaker security requirements than the security 
> area thinks are appropriate, without strong justification.  
> (Stronger requirements are fine -- they may have a different 
> operational environment, or a different threat model.)

Set 2:
 
> 1. Section 10.1.1 talks about "IP Forwarding Table MIB"
>   The revision of this MIB document (that you refer to) has a number
>   of deprecated and obsoleted objects. I think what you want (intend)
>   to say is that an agent must implement those objects that are
>   required as per ipForwardFullCompliance or ipForwardReadOnlyCompliance.
> 
>   I am also not sure that this is correct:
>       Support for this MIB does not imply that IPv4 or IPv4 specific
>       portions of this MIB be supported.
>   Did you mean "IPv4 or IPv6 specific portions" ?
>   But maybe the sentence is not needed at all. The two MODULE-COMPLIANCEs
>   that I point you to above specify IP version neurtral objects!
> 
> 2. Similar comments/issue with Sect 10.1.2
>   I think you want to refer to CURRENT MODULE-COMPLIANCE, namely 
>   ipMIBCompliance2. Pls check and make sure you be specific as to what
>   needs to be supported.

Set 3:

> One bigger issue, which may not be worth a Discuss, but 
> something that 
> IMHO should be discussed in some forum:
> 
>         All nodes that need to resolve names SHOULD implement stub-
>   resolver [RFC-1034] functionality, in RFC 1034 section 5.3.1 with
>   support for:
>                                                               
>     - AAAA type Resource Records [RFC-3596];
>     - reverse addressing in ip6.arpa using PTR records [RFC-3152];
>     - EDNS0 [RFC-2671] to allow for DNS packet sizes larger than 512
>       octets.
> 
> .. I'm operationally concerned about the last SHOULD.  As far as I 
> know, EDNS0 is not really implemented.  It does not seem to include a 
> SHOULD to something that hasn't seen practical, wide-spread deployment 
> already.  I'd recommend removing this or rewording it to a MAY.

John

--------------------------------------------------------------------
IETF IPv6 working group mailing list
[EMAIL PROTECTED]
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to