Skip to main content

Kerberized Internet Negotiation of Keys (KINK)
draft-ietf-kink-kink-11

Discuss


Yes

(Jeffrey Schiller)
(Sam Hartman)
(Steven Bellovin)

No Objection

(Alex Zinin)
(Bert Wijnen)
(Bill Fenner)
(Harald Alvestrand)
(Jon Peterson)
(Margaret Cullen)
(Mark Townsley)
(Ned Freed)
(Randy Bush)
(Scott Hollenbeck)
(Ted Hardie)
(Thomas Narten)

No Record

(Patrik Fältström)

Note: This ballot was opened for revision 11 and is now closed.

Scott Bradner Former IESG member
Discuss
Discuss [Treat as non-blocking comment] (2005-08-18) Unknown
notes:
                 at 36 pages this doc should have a table of contents
                 this can be done with an RFC Ed note if there are no
                 other reasons to spin the ID
Jeffrey Schiller Former IESG member
Yes
Yes () Unknown

                            
Sam Hartman Former IESG member
Yes
Yes () Unknown

                            
Steven Bellovin Former IESG member
Yes
Yes () Unknown

                            
Alex Zinin Former IESG member
No Objection
No Objection () Unknown

                            
Allison Mankin Former IESG member
No Objection
No Objection (2005-08-17) Unknown
Comment transferred from old style text ballot:

Please convey this to the working group for later consideration:

Yes, the MUST for truncated exponential backoff of retransmission
in the Transport Considerations is critically needed - thanks!

It seems like there might be a lot of retransmission in some 
circumstances - fragments due to long packets...

Could the group consider another transport (future PR-SCTP or a
reliability shim over DCCP, both of which are much more DoS resistant
than TCP) when they think about a later rev with more experience or
when they get ready for Draft Standard?
Bert Wijnen Former IESG member
No Objection
No Objection () Unknown

                            
Bill Fenner Former IESG member
No Objection
No Objection () Unknown

                            
Brian Carpenter Former IESG member
No Objection
No Objection (2005-12-13) Unknown
A couple of clarity comments on this text:

4.2.7.  KINK_ENCRYPT Payload

   The KINK_ENCRYPT payload encapsulates other payloads and is encrypted
   using the encryption algorithm specified by the etype of the session
   key.  This payload MUST be the final payload in the message.  KINK
   encrypt payloads MUST be encrypted before the final KINK checksum is
   applied.

Saying that an encapsulating payload is also the final payload
is a little confusing to me, although mathematically correct.
Also, shouldn't the last sentence begin with "KINK_ENCRYPT"
(keyword) rather than "KINK encrypt" (two words)?

Related clarity comments from Gen-ART review by Joel Halpern.

The wording of section 6.1 describing the content of the REPLY message, section 6.3 text describing the CREATE message, the example of the CREATE sequence, and section 4.2.7 on KINK_ENCRYPT are subtly inconsistent.
a) The description of KINK_ENCRYPT should indicate that the inner types are the same as regular KINK types, and that KINK_ENCRYPT is specifically intended to be used as a wrapper around other KINK TLVs.
b) The description of the REPLY and CREATE messages should state that KINK_ENCRYPT is a valid TLV.  The wording lists a set of TLVs that are valid, and does not list KINK_ENCRYPT.

Gen-ART review URL will be http://www.alvestrand.no/ietf/gen/reviews/draft-ietf-kink-kink-10-halpern.txt
Harald Alvestrand Former IESG member
No Objection
No Objection () Unknown

                            
Jon Peterson Former IESG member
No Objection
No Objection () Unknown

                            
Margaret Cullen Former IESG member
No Objection
No Objection () Unknown

                            
Mark Townsley Former IESG member
No Objection
No Objection () Unknown

                            
Ned Freed Former IESG member
No Objection
No Objection () Unknown

                            
Randy Bush Former IESG member
No Objection
No Objection () Unknown

                            
Russ Housley Former IESG member
No Objection
No Objection (2005-12-12) Unknown
  Section 1: s/peer to peer/peer-to-peer/

  Section 10: s/perfect forward secrecy/perfect forward secrecy (PFS)/
Scott Hollenbeck Former IESG member
(was Discuss) No Objection
No Objection () Unknown

                            
Ted Hardie Former IESG member
No Objection
No Objection () Unknown

                            
Thomas Narten Former IESG member
No Objection
No Objection () Unknown

                            
Patrik Fältström Former IESG member
No Record
No Record () Unknown