Skip to main content

Minimal IP Encapsulating Security Payload (ESP)
draft-ietf-lwig-minimal-esp-12

Revision differences

Document history

Date Rev. By Action
2022-12-21
12 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2022-12-03
12 Gunter Van de Velde Closed request for Last Call review by OPSDIR with state 'Overtaken by Events'
2022-11-05
12 (System) RFC Editor state changed to AUTH48
2022-10-11
12 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2022-09-27
12 (System) IANA Action state changed to No IANA Actions from In Progress
2022-09-27
12 (System) RFC Editor state changed to EDIT
2022-09-27
12 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2022-09-27
12 (System) Announcement was received by RFC Editor
2022-09-27
12 (System) IANA Action state changed to In Progress
2022-09-27
12 Cindy Morgan IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2022-09-27
12 Cindy Morgan IESG has approved the document
2022-09-27
12 Cindy Morgan Closed "Approve" ballot
2022-09-27
12 Cindy Morgan Ballot approval text was generated
2022-09-26
12 (System) Removed all action holders (IESG state changed)
2022-09-26
12 Erik Kline IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2022-09-23
12 Daniel Migault New version available: draft-ietf-lwig-minimal-esp-12.txt
2022-09-23
12 Daniel Migault New version accepted (logged-in submitter: Daniel Migault)
2022-09-23
12 Daniel Migault Uploaded new revision
2022-09-19
11 Paul Wouters pinged author and chairs to resolve last remaining DISCUSS item.
2022-09-12
11 Roman Danyliw [Ballot comment]
Thank you to David Mandelberg for the SECDIR review.

Thank you for addressing my DISCUSS and COMMENT feedback.
2022-09-12
11 Roman Danyliw [Ballot Position Update] Position for Roman Danyliw has been changed to No Objection from Discuss
2022-08-19
11 Paul Wouters
[Ballot comment]
Thanks for changes to the document.

My DISCUSS items were addressed enough for me to not block the document for publication.


Old DISCUSS …
[Ballot comment]
Thanks for changes to the document.

My DISCUSS items were addressed enough for me to not block the document for publication.


Old DISCUSS items:

[1]

Section 2:

It suggests a partial SPI match can be used, based on the assumption that
the SPI number is known to have mostly zeros because the device only uses
a hardcoded limited set (eg 257 to 260). While this is true for the outbound
SPI, this may not be true for the inbound SPI, especially if the peer is not
a "minimal ESP" device but a regular multipurpose OS. I think some clarification
is needed for this minimum implementation optimization.

[2]

Section 2.1:

      SPI that are not randomly generated over 32 bits may lead to privacy
      and security concerns.

The "may lead to security concerns" would be something that at the very least needs
to be understood and specified in the Security Considerations section. If it is too
difficult to determine the concerns, perhaps this optimization should be removed from
the draft.

      As a result, the use of alternative designs requires careful security
      and privacy reviews.

If it is known this proposal requires careful security reviews, were these done? If
so, why not replace this warning of danger with the actual output of those reviews?
If reviews were not done, it would imply this document hasn't fully worked out its
Security Considerations.

[3]

      SPI can typically be used to implement a key update

What is a "key update" in this context? It seems this section is suggesting to use
part of the SPI octet space to signal things to another part of the code on the device?
If so, would that code part then clear out those overloaded SPI octets or would they go
(unencrypted!) over the network for everyone to see?

[4]

      While the use of randomly generated SPIs may reduce the leakage or
      privacy of security related information by ESP itself, these
      information may also be leaked otherwise.

This is not a strong argument. This sentence and the entire paragraph really seem to
want to say something like "if you can see the network packets, the information
leak would already be present by seeing the encrypted traffic, irrespective of
whether the SPI is truly random or selected in a way that identifies the manufacturer"

[5]

      The security of all data
      protected under a given key decreases slightly with each message

I do not know of a generic claim like this for ESP. Can a reference be provided?
In general, rekeying is done to avoid decrypting previous traffic in case of a key compromise.
Or perhaps you mean the limits of algorithms like AES_CBC (or 3DES) with respect to
birthday and collision attacks? eg the commonly used maximum of 2^32-1 crypto operations
(which is not the same as maximum packets)

In these cases, the SN is only relevant for very high speed links, eg gbps and would never
apply to an IoT device that requires minimal ESP.

[6]

As noted in the TSVART review:

      Also, for devices that spend significant time sleeping, the SN
      would jump hugely on first waking. That shouldn't require any
      larger window (unless a stale packet from prior to the sleep was
      only released after a new packet on waking). But the receiver
      would need to be able to somehow detect massive jumps in the high
      order bits that are not communicated in the SN field.

Perhaps the document can add more specific detail on how to use the commonly
implemented time values into valid SNs that avoid ESN issues ?


[7]

      so the constrained device may not proceed to such checks

The language issue here inverts the meaning. What is meant is "so the constrained device
may omit such checks"

[8]

      TFC has not yet being widely adopted for standard ESP traffic.

It is widely implemented (eg in Linux). I agree that using it seems rare.
I am not convinced the reason for this is as is written. The issue I think
more relates to deciding to what size to pad. The easiest is to use the MTU,
but due to various encapsulation techniques (ESPinUDP, PPP-OE) it is not always
clear what the MTU of the IPsec link is. And path MTU discovery with IPsec does
not really work in practice.

But if the application/device tends to send packets between 1 and say 125 bytes,
it could always pad to 125 to not leak any information by packet size. The question
on when to do this or not really depends on the traffic being protected. And if this
the case, then it might be best to let the IKEv2 negotiation determine whether or not
to use this - just like regular use of TFC.

Regardless, TFC is optional and a minimum implementation can just omit it. Since
this document would also be combined with efforts reducing sending bytes to
preserve energy, it would make sense to avoid using TFC padding. Especially for sensors
that for example just always send a one byte temperature value to begin with.

      Such information could be used by the attacker in case a vulnerability is
      disclosed on the specific device.

I don't think "vulnerability" here is the issue. It could lead to exposing the size
of the original packet being protected by IPsec, which could (or could not) leak
information to an observer on the network.

[9]

      a minimal ESP implementation may not generate such dummy packet.

I think what is meant is "MUST NOT generate".

[10]

The Next Header Section is better named Dummy Packet. While it discusses the mandatory
Next Header field, it really only states not to send Dummy Packets. But it almost reads
as if the Next Header can be ignored or omitted.

[11]

      4.  Avoid Padding by sending payload data which are aligned to
          the cipher block length - 2 for the ESP trailer.

Isn't this advise just moving the padding from the IPsec layer to the application
layer? Eg the packet size or energy use would not be different if one implements
this advise?

[12]

Would it be useful to be able to signal a "mininum ESP" via IKEv2? I can imagine a simple
Notify could be used to signal this. A peer receiving this could then ensure it is
behaving in a "minimum ESP" compatible way even if it is a multi-purpose OS.

Comments:

There is a bit excessive and inconsistent linking to RFC 4303 throughout
the document. I think on first use of ESP the RFC can be referenced, but
further the document can just talk about ESP without keeping links to RFC 4303.
(I also thought there should not be any links in the abstract?)

The document should maybe mention IPsec v3 is meant for "ESP". IPsec v3 is a superset
of IPsec v2. There is no compatibility issue because the "new" things in v3 are
all negotiated via IKE.

I don't understand "a form of partial sequence integrity", as integrity
is a boolean - it passes or fails. I don't understand "partial"

"it becomes crucial" is a bit weak. I would say it must be guaranteed
that ESP on IoT remains interoperable with currently deployed ESP.

      This may raise some privacy issues as an
      observer is likely to be able to determine the constrained devices of
      the network.

This text might be better placed in a Privacy Considerations section.

The term "traffic shaping" is used in the document to refer to traffic being
padded (padding or TFC). Perhaps my personal exposure to Linux has caused me
to think of "traffic shaping" to mean to control the speed or flow of traffic,
and not meaning "modifying traffic size".
2022-08-19
11 Paul Wouters [Ballot Position Update] Position for Paul Wouters has been changed to No Objection from Discuss
2022-05-24
11 Daniel Migault New version available: draft-ietf-lwig-minimal-esp-11.txt
2022-05-24
11 Daniel Migault New version accepted (logged-in submitter: Daniel Migault)
2022-05-24
11 Daniel Migault Uploaded new revision
2022-04-08
10 (System) Changed action holders to Erik Kline (IESG state changed)
2022-04-08
10 (System) Sub state has been changed to AD Followup from Revised ID Needed
2022-04-08
10 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2022-04-08
10 Daniel Migault New version available: draft-ietf-lwig-minimal-esp-10.txt
2022-04-08
10 (System) New version accepted (logged-in submitter: Daniel Migault)
2022-04-08
10 Daniel Migault Uploaded new revision
2022-04-07
09 (System) Changed action holders to Erik Kline, Daniel Migault, Tobias Guggemos (IESG state changed)
2022-04-07
09 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2022-04-07
09 Robert Wilton [Ballot Position Update] New position, No Objection, has been recorded for Robert Wilton
2022-04-06
09 Murray Kucherawy [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy
2022-04-06
09 Roman Danyliw
[Ballot discuss]
** Section 5.  The paragraph starting with “As the generation of dummy packets …” would benefit from refinement.  It starts with saying dummy …
[Ballot discuss]
** Section 5.  The paragraph starting with “As the generation of dummy packets …” would benefit from refinement.  It starts with saying dummy packets “may be avoided”, but the second half of the paragraph argues the opposite.  The use cases of constrained devices concerned about device lifetimes (first half of the paragraph) doesn’t seem mutually exclusive from those with dedicated applications (second half).  I recommend being cleared on the assumptions guiding the use of dummy packets.
2022-04-06
09 Roman Danyliw
[Ballot comment]
Thank you to David Mandelberg for the SECDIR review.

I support Paul Wouter’s DISCUSS position.

** IDnits reports:

  == Unused Reference: 'RFC2119' …
[Ballot comment]
Thank you to David Mandelberg for the SECDIR review.

I support Paul Wouter’s DISCUSS position.

** IDnits reports:

  == Unused Reference: 'RFC2119' is defined on line 553, but no explicit
    reference was found in the text

  == Unused Reference: 'RFC8174' is defined on line 581, but no explicit
    reference was found in the text

** Please add a privacy consideration section (or merge it into the Security Considerations) to say that the practices suggested in Section 2.1 will reduce privacy/security by enabling device fingerprinting.

** Section 2.
  For nodes supporting only unicast communications, this document
  recommends to index SA with the SPI only. 

I don’t follow how this is new guidance.  Section 4.1 of RFC4301 only seems to already suggest that:

For an SA used to carry unicast traffic, the Security Parameters
  Index (SPI) by itself suffices to specify an SA.  ... However, as a local matter, an implementation may choose
  to use the SPI in conjunction with the IPsec protocol type (AH or
  ESP) for SA identification. 

** Section 2

  Typically, temperature sensors, wind sensors, used outdoors may not
  leak privacy sensitive information and most of its traffic is
  expected to be outbound traffic.  When used indoors, a sensor that
  reports every minute an encrypted status of the door (closed or
  opened) may leak truly little privacy sensitive information outside
  the local network.  In both cases, if the state of the sensor doesn't
  leak privacy info, a randomized SPI is not necessary.

Is this temperature/wind sensor example assuming that potentially leaking model and version information is not privacy sensitive (as established as possible in the previous paragraph)?

Is the door sensor example assuming that it is communicating on a local network?  This is a design decision that this class of sensor could never be integrated otherwise?

** Section 3.
  For inbound traffic, this document recommends that any receiver
  provides anti-replay protection,

What is the intent of this guidance – is it that “this document recommends that all receivers provide anti-replay protection”?  I’m having difficulty parsing the “any receiver”.

** Section 4.  Per the paragraph starting with “As a result, TFC cannot be enabled …”, I don’t understand why this text is needed.  The previous paragraph established that TFC is not recommended for this profile.  Why comment on an extension which is not part of the profile?

** Section 4.  Per the paragraph starting with “some constrained nodes …”, is this paragraph also needed?  What minimal ESP guidance is the implementer intended to take from this text?

** Section 7.

  This section lists some of the criteria that may be considered. 

Considered in support of what decision?

** Section 7.
  As a result, the list is provided as informational:

How should the reader use an informational list in an information document which doesn’t use any RFC2119 normative language?

** Section 7.
    In the latter case, authenticated
    encryption must always be considered [RFC8221].

What does it mean to “consider” authenticated encryption?  Should it be used as a first choice, unless use is not possible?

** Section 7.
      When the key is likely to be re-used
      across reboots, this document recommends to consider algorithms
      that are nonce misuse resistant such as,

What does it mean to “recommend to consider”?

** Section 7.  Bullet 3, Interoperability.  The guidance being given to implementers isn’t clear to me.

Editorial
-- Section 3.  Typo.  s/know whereas the received/know whether the received/

-- Section 3. Editorial. s/sending a temperature/sending a temperature measurement/ 

-- Section 3.  s/sending a temperature/sending a temperature measurement/

-- Section 4.  Typo. s/TFC has not yet being/TFC has not been/

-- Section 5.  Typo. s/More especially, in constrained /Specifically, in a constrained/

-- Section 5.  Typo. s/and so may be avoided/a should be avoided/.

-- Section 7.  s/overtime/over time/

-- Section 7.  Typo.  s/not be known vulnerable or weak/must not use ciphers known to be vulnerable or weak/

-- Section 9.  Editorial.  s/for each field/for each ESP field/.
2022-04-06
09 Roman Danyliw [Ballot Position Update] New position, Discuss, has been recorded for Roman Danyliw
2022-04-06
09 Sabrina Tanamal IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2022-04-06
09 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2022-04-06
09 Daniel Migault New version available: draft-ietf-lwig-minimal-esp-09.txt
2022-04-06
09 (System) New version accepted (logged-in submitter: Daniel Migault)
2022-04-06
09 Daniel Migault Uploaded new revision
2022-04-06
08 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2022-04-06
08 Zaheduzzaman Sarker [Ballot comment]
Thanks for this specification. Thanks to Bob Briscoe for the TSVART review.
2022-04-06
08 Zaheduzzaman Sarker [Ballot Position Update] New position, No Objection, has been recorded for Zaheduzzaman Sarker
2022-04-05
08 Paul Wouters
[Ballot discuss]
I must apologize first to the authors. Many months ago I promised to send
a diff with language improvements, and I did not …
[Ballot discuss]
I must apologize first to the authors. Many months ago I promised to send
a diff with language improvements, and I did not do so. Unfortunately, I do
think the document needs this and the amount is too much to leave on the RFC
Editor. I will send a separate diff for language improvements to the authors
and not further comment on language in my ballot here.

[1]

Section 2:

It suggests a partial SPI match can be used, based on the assumption that
the SPI number is known to have mostly zeros because the device only uses
a hardcoded limited set (eg 257 to 260). While this is true for the outbound
SPI, this may not be true for the inbound SPI, especially if the peer is not
a "minimal ESP" device but a regular multipurpose OS. I think some clarification
is needed for this minimum implementation optimization.

[2]

Section 2.1:

      SPI that are not randomly generated over 32 bits may lead to privacy
      and security concerns.

The "may lead to security concerns" would be something that at the very least needs
to be understood and specified in the Security Considerations section. If it is too
difficult to determine the concerns, perhaps this optimization should be removed from
the draft.

      As a result, the use of alternative designs requires careful security
      and privacy reviews.

If it is known this proposal requires careful security reviews, were these done? If
so, why not replace this warning of danger with the actual output of those reviews?
If reviews were not done, it would imply this document hasn't fully worked out its
Security Considerations.

[3]

      SPI can typically be used to implement a key update

What is a "key update" in this context? It seems this section is suggesting to use
part of the SPI octet space to signal things to another part of the code on the device?
If so, would that code part then clear out those overloaded SPI octets or would they go
(unencrypted!) over the network for everyone to see?

[4]

      While the use of randomly generated SPIs may reduce the leakage or
      privacy of security related information by ESP itself, these
      information may also be leaked otherwise.

This is not a strong argument. This sentence and the entire paragraph really seem to
want to say something like "if you can see the network packets, the information
leak would already be present by seeing the encrypted traffic, irrespective of
whether the SPI is truly random or selected in a way that identifies the manufacturer"

[5]

      The security of all data
      protected under a given key decreases slightly with each message

I do not know of a generic claim like this for ESP. Can a reference be provided?
In general, rekeying is done to avoid decrypting previous traffic in case of a key compromise.
Or perhaps you mean the limits of algorithms like AES_CBC (or 3DES) with respect to
birthday and collision attacks? eg the commonly used maximum of 2^32-1 crypto operations
(which is not the same as maximum packets)

In these cases, the SN is only relevant for very high speed links, eg gbps and would never
apply to an IoT device that requires minimal ESP.

[6]

As noted in the TSVART review:

      Also, for devices that spend significant time sleeping, the SN
      would jump hugely on first waking. That shouldn't require any
      larger window (unless a stale packet from prior to the sleep was
      only released after a new packet on waking). But the receiver
      would need to be able to somehow detect massive jumps in the high
      order bits that are not communicated in the SN field.

Perhaps the document can add more specific detail on how to use the commonly
implemented time values into valid SNs that avoid ESN issues ?


[7]

      so the constrained device may not proceed to such checks

The language issue here inverts the meaning. What is meant is "so the constrained device
may omit such checks"

[8]

      TFC has not yet being widely adopted for standard ESP traffic.

It is widely implemented (eg in Linux). I agree that using it seems rare.
I am not convinced the reason for this is as is written. The issue I think
more relates to deciding to what size to pad. The easiest is to use the MTU,
but due to various encapsulation techniques (ESPinUDP, PPP-OE) it is not always
clear what the MTU of the IPsec link is. And path MTU discovery with IPsec does
not really work in practice.

But if the application/device tends to send packets between 1 and say 125 bytes,
it could always pad to 125 to not leak any information by packet size. The question
on when to do this or not really depends on the traffic being protected. And if this
the case, then it might be best to let the IKEv2 negotiation determine whether or not
to use this - just like regular use of TFC.

Regardless, TFC is optional and a minimum implementation can just omit it. Since
this document would also be combined with efforts reducing sending bytes to
preserve energy, it would make sense to avoid using TFC padding. Especially for sensors
that for example just always send a one byte temperature value to begin with.

      Such information could be used by the attacker in case a vulnerability is
      disclosed on the specific device.

I don't think "vulnerability" here is the issue. It could lead to exposing the size
of the original packet being protected by IPsec, which could (or could not) leak
information to an observer on the network.

[9]

      a minimal ESP implementation may not generate such dummy packet.

I think what is meant is "MUST NOT generate".

[10]

The Next Header Section is better named Dummy Packet. While it discusses the mandatory
Next Header field, it really only states not to send Dummy Packets. But it almost reads
as if the Next Header can be ignored or omitted.

[11]

      4.  Avoid Padding by sending payload data which are aligned to
          the cipher block length - 2 for the ESP trailer.

Isn't this advise just moving the padding from the IPsec layer to the application
layer? Eg the packet size or energy use would not be different if one implements
this advise?

[12]

Would it be useful to be able to signal a "mininum ESP" via IKEv2? I can imagine a simple
Notify could be used to signal this. A peer receiving this could then ensure it is
behaving in a "minimum ESP" compatible way even if it is a multi-purpose OS.
2022-04-05
08 Paul Wouters
[Ballot comment]

There is a bit excessive and inconsistent linking to RFC 4303 throughout
the document. I think on first use of ESP the RFC …
[Ballot comment]

There is a bit excessive and inconsistent linking to RFC 4303 throughout
the document. I think on first use of ESP the RFC can be referenced, but
further the document can just talk about ESP without keeping links to RFC 4303.
(I also thought there should not be any links in the abstract?)

The document should maybe mention IPsec v3 is meant for "ESP". IPsec v3 is a superset
of IPsec v2. There is no compatibility issue because the "new" things in v3 are
all negotiated via IKE.

I don't understand "a form of partial sequence integrity", as integrity
is a boolean - it passes or fails. I don't understand "partial"

"it becomes crucial" is a bit weak. I would say it must be guaranteed
that ESP on IoT remains interoperable with currently deployed ESP.

      This may raise some privacy issues as an
      observer is likely to be able to determine the constrained devices of
      the network.

This text might be better placed in a Privacy Considerations section.

The term "traffic shaping" is used in the document to refer to traffic being
padded (padding or TFC). Perhaps my personal exposure to Linux has caused me
to think of "traffic shaping" to mean to control the speed or flow of traffic,
and not meaning "modifying traffic size".
2022-04-05
08 Paul Wouters [Ballot Position Update] New position, Discuss, has been recorded for Paul Wouters
2022-04-05
08 Lars Eggert
[Ballot comment]
Section 2. , paragraph 6, comment:
>    [RFC4303] does not require the SPI to be randomly generated over 32
>  …
[Ballot comment]
Section 2. , paragraph 6, comment:
>    [RFC4303] does not require the SPI to be randomly generated over 32
>    bits.  However, this is the recommended way to generate SPIs as it
>    provides some privacy benefits and avoids, for example, correlation
>    between ESP communications.  To randomly generate a 32 bit SPI, the
>    node generates a random 32 bit valueand checks it does not fall in
>    the 0-255 range.  If the SPI has an acceptable value, it is used to
>    index the inbound session, otherwise the SPI is re-generated until an
>    acceptable value is found.

Wouldn't it be simpler to compute a 24-bit random value and left-shift it by
eight? Or left-shift the 32-bit value; both remove the need to check.

Found terminology that should be reviewed for inclusivity; see
https://www.rfc-editor.org/part2/#inclusive_language for background and more
guidance:

* Term "dummy"; alternatives might be "placeholder", "sample", "stand-in",
  "substitute".

Thanks to Roni Even for their General Area Review Team (Gen-ART) review
(https://mailarchive.ietf.org/arch/msg/gen-art/W3R6WdPRLgAuvMIJYWnld5uaCmU).

-------------------------------------------------------------------------------
NIT
-------------------------------------------------------------------------------
All comments below are about very minor potential issues that you may choose to
address in some way - or ignore - as you see fit. Some were flagged by
automated tools (via https://github.com/larseggert/ietf-reviewtool), so there
will likely be some false positives. There is no need to let me know what you
did with these suggestions.

Section 2. , paragraph 6, nit:
-    node generates a random 32 bit valueand checks it does not fall in
+    node generates a random 32 bit value and checks it does not fall in
+                                        +

Section 3. , paragraph 6, nit:
-    are no requirements to implement an anti-replay protection mechanism
-    implemented by IPsec.  Similarly to the SN the implementation of anti
-  -----------------------
+    are no requirements to implement an anti-replay protection mechanism.
+                                                                        +

Section 4. , paragraph 4, nit:
-    would typically be the case when the Data Payload is of fix size.
+    would typically be the case when the Data Payload is of fixed size.
+                                                              ++

Document still refers to the "Simplified BSD License", which was corrected in
the TLP on September 21, 2021. It should instead refer to the "Revised BSD
License".

Uncited references: [RFC2119] and [RFC8174].

Section 1. , paragraph 1, nit:
> igure 1 describes an ESP Packet. Currently ESP is implemented in the kernel o
>                                  ^^^^^^^^^
A comma may be missing after the conjunctive/linking adverb "Currently".

Section 1. , paragraph 2, nit:
> y to fit multiple purpose usage of these OS. However, completeness of the IPs
>                                    ^^^^^^^^
The plural demonstrative "these" does not agree with the singular noun "OS".

Section 1. , paragraph 2, nit:
>  as well as multipurpose scope of these OS is often performed at the expense
>                                  ^^^^^^^^
The plural demonstrative "these" does not agree with the singular noun "OS".

Section 1. , paragraph 3, nit:
> or constrained devices remains inter-operable with the standard ESP implemen
>                                ^^^^^^^^^^^^^^
This word is normally spelled as one.

Section 2. , paragraph 2, nit:
> ommunications, this document recommends to index SA with the SPI only. The i
>                              ^^^^^^^^^^^^^^^^^^^
The verb "recommends" is used with the gerund form.

Section 2.1. , paragraph 3, nit:
> g the key is being used. For example, a SPI might be encoded with the Securit
>                                      ^
Use "an" instead of "a" if the following word starts with a vowel sound, e.g.
"an article", "an hour".

Section 2.1. , paragraph 4, nit:
> h privacy and security concerns. Typically some specific values or subset of
>                                  ^^^^^^^^^
A comma may be missing after the conjunctive/linking adverb "Typically".

Section 2.1. , paragraph 5, nit:
> ed information by ESP itself, these information may also be leaked otherwise
>                              ^^^^^^^^^^^^^^^^^
The plural demonstrative "these" does not agree with the singular noun
"information".

Section 2.1. , paragraph 5, nit:
> affic pattern before determining non random SPI can be used. Typically, temp
>                                  ^^^^^^^^^^
This expression is normally spelled as one or with a hyphen.

Section 2.1. , paragraph 5, nit:
> s, used outdoors may not leak privacy sensitive information and most of its t
>                              ^^^^^^^^^^^^^^^^^
This word is normally spelled with a hyphen.

Section 2.1. , paragraph 5, nit:
> opened) may leak truly little privacy sensitive information outside the local
>                              ^^^^^^^^^^^^^^^^^
This word is normally spelled with a hyphen.

Section 2.1. , paragraph 6, nit:
>  packet. The SN is set by the sender so the receiver can implement anti-repl
>                                    ^^^
Use a comma before "so" if it connects two independent clauses (unless they are
closely connected and short).

Section 3. , paragraph 6, nit:
> ability to spoof and replay an acknowledgement is of limited interest and mig
>                                ^^^^^^^^^^^^^^^
Do not mix variants of the same word ("acknowledgement" and "acknowledgment")
within a single text.

Section 3. , paragraph 6, nit:
> y discarding any packets that present a SN whose value is too much in the pa
>                                      ^
Use "an" instead of "a" if the following word starts with a vowel sound, e.g.
"an article", "an hour".

Section 3. , paragraph 6, nit:
> s based on the largest possible value a SN can take over a session. When SN
>                                      ^
Use "an" instead of "a" if the following word starts with a vowel sound, e.g.
"an article", "an hour".

Section 3. , paragraph 7, nit:
> ned devices, this document recommends to implement some rekey mechanisms (see
>                            ^^^^^^^^^^^^^^^^^^^^^^^
The verb "recommends" is used with the gerund form.

Section 4. , paragraph 5, nit:
> ns - may also reveal important privacy oriented information. Some constrained
>                                ^^^^^^^^^^^^^^^^
This word is normally spelled with a hyphen.

Section 4. , paragraph 5, nit:
>  a sufficient tradeoff between the require energy to send additional payload
>                                    ^^^^^^^
The word "require" is not a noun. Did you mean "requirement"?

Section 5. , paragraph 4, nit:
> on the cryptographic suite used. Currently [RFC8221] only recommends cryptog
>                                  ^^^^^^^^^
A comma may be missing after the conjunctive/linking adverb "Currently".

Section 5. , paragraph 4, nit:
> ent with a size different from zero. It length is defined by the security rec
>                                      ^^
It seems that the possessive pronoun "its" fits better in this context. Please
verify.

Section 7. , paragraph 2, nit:
> oss reboots, this document recommends to consider algorithms that are nonce
>                            ^^^^^^^^^^^^^^^^^^^^^^
The verb "recommends" is used with the gerund form.

Section 7. , paragraph 5, nit:
> of the encryption algorithm transform or the energy associated with it are es
>                                      ^^^
Use a comma before "or" if it connects two independent clauses (unless they are
closely connected and short).

Section 7. , paragraph 10, nit:
> eration must follow [RFC4086]. In addition [SP-800-90A-Rev-1] provides approp
>                                  ^^^^^^^^
A comma may be missing after the conjunctive/linking adverb "addition".

Section 9. , paragraph 2, nit:
> In particular Scott Fluhrer suggested to include the rekey index in the SPI.
>                            ^^^^^^^^^^^^^^^^^^^^
The verb "suggested" is used with the gerund form.
2022-04-05
08 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded for Lars Eggert
2022-04-04
08 Martin Duke
[Ballot comment]
Thanks to Bob Briscoe for the TSVART review.

Sec 2.1. I find it odd that a node implementing IPSec is overburdened by generating …
[Ballot comment]
Thanks to Bob Briscoe for the TSVART review.

Sec 2.1. I find it odd that a node implementing IPSec is overburdened by generating a random number, but this is not my domain.

Sec 3. Bob and the authors had an interesting discussion on time-based SN and replay windows. It seems to me that the best way to do this would be for the receiver to keep a replay window of some number of packets rather than SNs. The receiver would then store the last, say, 10 packet SNs regardless of how many SNs that covered. This would avoid all the issues with the sender skipping many SNs.
2022-04-04
08 Martin Duke [Ballot Position Update] New position, No Objection, has been recorded for Martin Duke
2022-04-04
08 Éric Vyncke
[Ballot comment]
Thank you for the work put into this document.

Please find below some non-blocking COMMENT points (but replies would be appreciated even if …
[Ballot comment]
Thank you for the work put into this document.

Please find below some non-blocking COMMENT points (but replies would be appreciated even if only for my own education), and some nits.

Special thanks to Mohit Sethi for the shepherd's write-up including the difficulties to reach WG consensus, I only regret the absence of justification for the intended status.

I hope that this helps to improve the document,

Regards,

-éric

## Section 2

"SA lookup needs to be performed using the longest match", I will let the SEC ADs to raise this point if required, but my understanding of IPsec is that it is not a "longest match" but a "full match on IP SA & SPI".

"the combination of a fixed value and the memory address of the SAD structure", should the 'fixed value' be changed on every reboot/reset of the IPsec code ?

Please expand "SAD" on first use.

## Section 2.1

The first paragraphs indicate that local SPI is for inbound traffic, but the last paragraph appears to be about outbound traffic from sensors. Unsure how to reconciliate the two parts of this section.

Probably just editorial in this informational document, but I wonder how to reconciliate the two proposed alternatives for SPI generation:

- section 2 use a 'low grade' random SPI

- section 2.1 use a combo of SAD + rekey index

## Section 3

When using time for sequence number (I like the idea BTW), what measures should be taken to handle the 32-bit rollover ?

Unsure whether I agree with the text around disabling anti-reply even for a IoT device, especially for actuators. The text has
  "These resources need also to balance that absence of anti-replay mechanism,
  may lead to unnecessary integrity check operations that might be
  significantly more expensive as well."

which appears too lenient IMHO.

# NITS 

s/32 bits field/32-bit field/

## Section 2

s/ valueand checks/ value and checks/
2022-04-04
08 Éric Vyncke [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke
2022-03-31
08 (System) IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2022-03-23
08 Cindy Morgan Placed on agenda for telechat - 2022-04-07
2022-03-23
08 Erik Kline Ballot has been issued
2022-03-23
08 Erik Kline [Ballot Position Update] New position, Yes, has been recorded for Erik Kline
2022-03-23
08 Erik Kline Created "Approve" ballot
2022-03-23
08 Erik Kline IESG state changed to IESG Evaluation from Waiting for Writeup
2022-03-23
08 Erik Kline Ballot writeup was changed
2021-11-08
08 Daniel Migault New version available: draft-ietf-lwig-minimal-esp-08.txt
2021-11-08
08 (System) New version accepted (logged-in submitter: Daniel Migault)
2021-11-08
08 Daniel Migault Uploaded new revision
2021-09-28
07 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2021-09-28
07 Daniel Migault New version available: draft-ietf-lwig-minimal-esp-07.txt
2021-09-28
07 (System) New version accepted (logged-in submitter: Daniel Migault)
2021-09-28
07 Daniel Migault Uploaded new revision
2021-09-28
06 Mohit Sethi
Mohit Sethi is the document Shepherd. Erik Kline is the responsible Area Director.

The document defines techniques for a minimal implementation of the Encapsulation Security …
Mohit Sethi is the document Shepherd. Erik Kline is the responsible Area Director.

The document defines techniques for a minimal implementation of the Encapsulation Security Payload (ESP) defined in RFC 4303. It does not update or modify RFC 4303 in any way. In case of any conflicts RFC 4303 is treated as authoritative description.

The following people reviewed and provided comments: Tero Kivinen, Valery Smyslov, and Scott Fluhrer. Paul Wouters had expressed some reservations (https://mailarchive.ietf.org/arch/msg/lwip/xDcICiuALZ2ExF3qwRCnhCQC3A0/) during the call for adoption. He had reservations against relaxing the randomness requirements for SPI. Paul also noted that the argument for not having a sequence number counters are weak as AES-GCM and CHACHA20POLY1305 require a counter anyways. Paul was amenable to adopting the document as long as it was defining an ESP profile for resource-constrained devices and not modifying the protocol itself.

Edit: 7th June 2021: There was input from Paul Wouters after the WGLC: https://mailarchive.ietf.org/arch/msg/ipsec/y5lmwi_UmWqOJjUEKOnxHoTMLmA/. After an explanation from Tero, Paul wrote: "This email has helped a lot and I would really like to see some of this text included in the draft.". I believe the authors have updated the draft based on the email discussion: https://mailarchive.ietf.org/arch/msg/lwip/3rNPyEndI97eFNKjdItBCRFgir8/.

No issues were raised during the working group last call. The document shepherd has solicited reviews from security and IoT directorate as well as the gen-art team.

The Shepherd has verified that all of the authors have already disclosed any IPR related to this document, as is required by BCPs 78 and 79.

There are no DOWNREFs.

There are no IANA considerations.
2021-09-01
06 Bob Briscoe Request for Last Call review by TSVART Completed: On the Right Track. Reviewer: Bob Briscoe. Sent review to list.
2021-08-26
06 (System) IESG state changed to Waiting for Writeup from In Last Call
2021-08-23
06 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2021-08-23
06 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-lwig-minimal-esp-06, which is currently in Last Call, and has the following comments:

We …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-lwig-minimal-esp-06, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any registry actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object.

If this assessment is not accurate, please respond as soon as possible.

Thank you,

Sabrina Tanamal
Lead IANA Services Specialist
2021-08-19
06 Tero Kivinen Request for Last Call review by SECDIR Completed: Ready. Reviewer: David Mandelberg. Submission of review completed at an earlier date.
2021-08-13
06 Wesley Eddy Request for Last Call review by TSVART is assigned to Bob Briscoe
2021-08-13
06 Wesley Eddy Request for Last Call review by TSVART is assigned to Bob Briscoe
2021-08-13
06 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Fred Baker
2021-08-13
06 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Fred Baker
2021-08-12
06 Tero Kivinen Request for Last Call review by SECDIR Completed: Ready. Reviewer: David Mandelberg.
2021-08-12
06 Amy Vezza IANA Review state changed to IANA - Review Needed
2021-08-12
06 Amy Vezza
The following Last Call announcement was sent out (ends 2021-08-26):

From: The IESG
To: IETF-Announce
CC: draft-ietf-lwig-minimal-esp@ietf.org, ek.ietf@gmail.com, lwig-chairs@ietf.org, lwip@ietf.org, mohit.m.sethi@ericsson.com …
The following Last Call announcement was sent out (ends 2021-08-26):

From: The IESG
To: IETF-Announce
CC: draft-ietf-lwig-minimal-esp@ietf.org, ek.ietf@gmail.com, lwig-chairs@ietf.org, lwip@ietf.org, mohit.m.sethi@ericsson.com
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (Minimal ESP) to Informational RFC


The IESG has received a request from the Light-Weight Implementation Guidance
WG (lwig) to consider the following document: - 'Minimal ESP'
  as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2021-08-26. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  This document describes a minimal implementation of the IP
  Encapsulation Security Payload (ESP) defined in RFC 4303.  Its
  purpose is to enable implementation of ESP with a minimal set of
  options to remain compatible with ESP as described in RFC 4303.  A
  minimal version of ESP is not intended to become a replacement of the
  RFC 4303 ESP.  Instead, a minimal implementation is expected to be
  optimized for constrained environment while remaining interoperable
  with implementations of RFC 4303 ESP.  Some constraints include
  limiting the number of flash writes, handling frequent wakeup / sleep
  states, limiting wakeup time, or reducing the use of random
  generation.

  This document does not update or modify RFC 4303, but provides a
  compact description of how to implement the minimal version of the
  protocol.  RFC 4303 remains the authoritative description.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-lwig-minimal-esp/



No IPR declarations have been submitted directly on this I-D.




2021-08-12
06 Amy Vezza IESG state changed to In Last Call from Last Call Requested
2021-08-12
06 Amy Vezza Last call announcement was changed
2021-08-12
06 Tero Kivinen Request for Last Call review by SECDIR is assigned to David Mandelberg
2021-08-12
06 Tero Kivinen Request for Last Call review by SECDIR is assigned to David Mandelberg
2021-08-11
06 Erik Kline Requested Last Call review by SECDIR
2021-08-11
06 Erik Kline Last call was requested
2021-08-11
06 Erik Kline Last call announcement was generated
2021-08-11
06 Erik Kline Ballot approval text was generated
2021-08-11
06 Erik Kline Ballot writeup was generated
2021-08-11
06 Erik Kline IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2021-08-11
06 Erik Kline
Thanks for the changes from -05 to -06.

A few more nits, but I'm going to request IETF LC for -06.  All of this
can …
Thanks for the changes from -05 to -06.

A few more nits, but I'm going to request IETF LC for -06.  All of this
can wait for other feedback from IETF LC and SEC-DIR review.

[S1] [comment]

* Thanks for cleaning up the requirements language issue.  I think this mean
  that RFCs 2119 and 8174 can be removed from the references section.

[S2] [nit]

* s/valueand/value and/
2021-07-26
06 (System) Changed action holders to Erik Kline (IESG state changed)
2021-07-26
06 (System) Sub state has been changed to AD Followup from Revised ID Needed
2021-07-26
06 Daniel Migault New version available: draft-ietf-lwig-minimal-esp-06.txt
2021-07-26
06 (System) New version accepted (logged-in submitter: Daniel Migault)
2021-07-26
06 Daniel Migault Uploaded new revision
2021-06-07
05 Erik Kline
[abstract] [nit]

* "Some constrains include" -> "Some constraints include"

[S1] [comment]

* Someone will inevitably point out that requirements terminology
  don't belong in …
[abstract] [nit]

* "Some constrains include" -> "Some constraints include"

[S1] [comment]

* Someone will inevitably point out that requirements terminology
  don't belong in an Informational document.

  Suggest removing this and lowercase all the terms throughout the
  document.  I know it doesn't seem ideal, but I don't think it
  really lowers the value of any of the recommendations in the doc.

[S2] [nit]

* "and limited traffic flow confidentiality" seems to be redundant
  with "provide confidentiality" earlier in the sentence.

  (It also raises the question of "in what way is it limited?",
  which just seems like an unnecessary digression.)

[S3] [nit]

* "used internal" -> "used internally"

* ", checks does not fall" -> "and checks it does not fall"

[S3.1] [question]

* "proceed to clean key update"

  What does this mean?  "clean"?

* "use of randomly generated SPI" ->
  "use of randomly generated SPIs"

* "leakage or privacy or security related information" ->
  "leakage of privacy or security related information"

[S4] [question]

* When too many packets are dropped (due to "out of window" conditions),
  does this cause the session to be renegotiated?

  If so, is it important to weight the computational impact of
  reestablishing IPsec crypto state relative to trying to maintain
  better record of the previously seen SNs?

[S4] [nit]

* "drop an non required anti replay protection" ->
  "drop a non-required anti-replay protection"

* "the support ESN is not" -> "the support of ESN is not"

[S5] [nit]

* "that were rely on" -> "that were relying on"

* "rather when" -> "rather than when"

[S6] [nit]

* "generate and receive dummy packet" ->
  "generate and receive dummy packets"

* "fix value" -> "fixed value"

[S8] [nit]

* "provided as indicative" -> "provided as information"?

* "Constraint devices" -> "Constrained devices"

* "energy associated to it" -> "energy associated with it"

[S10] [nit]

* "associated to the management" -> "associated with the management"

* "This usually include mechanisms to prevent a nonce to repeat
  for example."

  "This usually includes mechanisms to prevent a nonce from repeating,
  for example."

* "in conjunction of" -> "in conjunction with"

* "responsible to negotiate" -> "responsible for negotiating"
2021-06-07
05 (System) Changed action holders to Erik Kline, Daniel Migault, Tobias Guggemos (IESG state changed)
2021-06-07
05 Erik Kline IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation
2021-06-07
05 Mohit Sethi
Mohit Sethi is the document Shepherd. Erik Kline is the responsible Area Director.

The document defines techniques for a minimal implementation of the Encapsulation Security …
Mohit Sethi is the document Shepherd. Erik Kline is the responsible Area Director.

The document defines techniques for a minimal implementation of the Encapsulation Security Payload (ESP) defined in RFC 4303. It does not update or modify RFC 4303 in any way. In case of any conflicts RFC 4303 is treated as authoritative description.

The following people reviewed and provided comments: Tero Kivinen, Valery Smyslov, and others. Paul Wouters had expressed strong reservations (https://mailarchive.ietf.org/arch/msg/lwip/xDcICiuALZ2ExF3qwRCnhCQC3A0/) during the call for adoption. He had reservations against relaxing the randomness requirements for SPI. He also noted that the argument for not having a sequence number counters are weak as AES-GCM and CHACHA20POLY1305 require a counter anyways. Paul was amenable to adopting the document as long as it was defining an ESP profile for resource-constrained devices and not modifying the protocol itself.

Edit: 7th June 2021: There was some input from Paul Wouters after the WGLC that the ADs should be aware of: https://mailarchive.ietf.org/arch/msg/ipsec/y5lmwi_UmWqOJjUEKOnxHoTMLmA/

No issues were raised during the working group last call. The document shepherd has solicited reviews from security and IoT directorate as well as the gen-art team.

The Shepherd has verified that all of the authors have already disclosed any IPR related to this document, as is required by BCPs 78 and 79.

There are no DOWNREFs.

There are no IANA considerations.
2021-06-07
05 (System) Changed action holders to Erik Kline (IESG state changed)
2021-06-07
05 Erik Kline IESG state changed to AD Evaluation from Publication Requested
2021-06-07
05 Mohit Sethi
Mohit Sethi is the document Shepherd. Erik Kline is the responsible Area Director.

The document defines techniques for a minimal implementation of the Encapsulation Security …
Mohit Sethi is the document Shepherd. Erik Kline is the responsible Area Director.

The document defines techniques for a minimal implementation of the Encapsulation Security Payload (ESP) defined in RFC 4303. It does not update or modify RFC 4303 in any way. In case of any conflicts RFC 4303 is treated as authoritative description.

The following people reviewed and provided comments: Tero Kivinen, Valery Smyslov, and others. Paul Wouters had expressed strong reservations (https://mailarchive.ietf.org/arch/msg/lwip/xDcICiuALZ2ExF3qwRCnhCQC3A0/) during the call for adoption. He had reservations against relaxing the randomness requirements for SPI. He also noted that the argument for not having a sequence number counters are weak as AES-GCM and CHACHA20POLY1305 require a counter anyways. Paul was amenable to adopting the document as long as it was defining an ESP profile for resource-constrained devices and not modifying the protocol itself.

No issues were raised during the working group last call. The document shepherd has solicited reviews from security and IoT directorate as well as the gen-art team.

The Shepherd has verified that all of the authors have already disclosed any IPR related to this document, as is required by BCPs 78 and 79.

There are no DOWNREFs.

There are no IANA considerations.
2021-06-07
05 Mohit Sethi Responsible AD changed to Erik Kline
2021-06-07
05 Mohit Sethi IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2021-06-07
05 Mohit Sethi IESG state changed to Publication Requested from I-D Exists
2021-06-07
05 Mohit Sethi IESG process started in state Publication Requested
2021-06-07
05 Mohit Sethi Tag Doc Shepherd Follow-up Underway cleared.
2021-06-07
05 Mohit Sethi Changed consensus to Yes from Unknown
2021-04-13
05 Daniel Migault New version available: draft-ietf-lwig-minimal-esp-05.txt
2021-04-13
05 (System) New version approved
2021-04-13
05 (System) Request for posting confirmation emailed to previous authors: Daniel Migault , Tobias Guggemos
2021-04-13
05 Daniel Migault Uploaded new revision
2021-04-02
04 Roni Even Request for Last Call review by GENART Completed: Ready with Issues. Reviewer: Roni Even. Sent review to list.
2021-04-01
04 Daniel Migault New version available: draft-ietf-lwig-minimal-esp-04.txt
2021-04-01
04 (System) New version approved
2021-04-01
04 (System) Request for posting confirmation emailed to previous authors: Daniel Migault , Tobias Guggemos
2021-04-01
04 Daniel Migault Uploaded new revision
2021-04-01
03 Tero Kivinen Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: David Mandelberg. Submission of review completed at an earlier date.
2021-03-27
03 Tero Kivinen Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: David Mandelberg.
2021-03-26
03 Nancy Cam-Winget Request for Last Call review by IOTDIR Completed: Ready with Issues. Reviewer: Nancy Cam-Winget. Sent review to list.
2021-03-25
03 Tero Kivinen Request for Last Call review by SECDIR is assigned to David Mandelberg
2021-03-25
03 Tero Kivinen Request for Last Call review by SECDIR is assigned to David Mandelberg
2021-03-24
03 Daniel Migault New version available: draft-ietf-lwig-minimal-esp-03.txt
2021-03-24
03 (System) New version approved
2021-03-24
03 (System) Request for posting confirmation emailed to previous authors: Daniel Migault , Tobias Guggemos
2021-03-24
03 Daniel Migault Uploaded new revision
2021-03-22
02 Jean Mahoney Request for Last Call review by GENART is assigned to Roni Even
2021-03-22
02 Jean Mahoney Request for Last Call review by GENART is assigned to Roni Even
2021-03-22
02 Ines Robles Request for Last Call review by IOTDIR is assigned to Nancy Cam-Winget
2021-03-22
02 Ines Robles Request for Last Call review by IOTDIR is assigned to Nancy Cam-Winget
2021-03-20
02 Mohit Sethi
Mohit Sethi is the document Shepherd. Erik Kline is the responsible Area Director.

The document defines techniques for a minimal implementation of the Encapsulation Security …
Mohit Sethi is the document Shepherd. Erik Kline is the responsible Area Director.

The document defines techniques for a minimal implementation of the Encapsulation Security Payload (ESP) defined in RFC 4303. It does not update or modify RFC 4303 in any way. In case of any conflicts RFC 4303 is treated as authoritative description.

The following people reviewed and provided comments: Tero Kivinen, Valery Smyslov, and others. Paul Wouters had expressed strong reservations (https://mailarchive.ietf.org/arch/msg/lwip/xDcICiuALZ2ExF3qwRCnhCQC3A0/) during the call for adoption. He had reservations against relaxing the randomness requirements for SPI. He also noted that the argument for not having a sequence number counters are weak as AES-GCM and CHACHA20POLY1305 require a counter anyways. Paul was amenable to adopting the document as long as it was defining an ESP profile for resource-constrained devices and not modifying the protocol itself.

No issues were raised during the working group last call. The document shepherd has solicited reviews from security and IoT directorate as well as the gen-art team.

The Shepherd has verified that all of the authors have already disclosed any IPR related to this document, as is required by BCPs 78 and 79.

There are no DOWNREFs.

There are no IANA considerations.
2021-03-20
02 Mohit Sethi Requested Last Call review by IOTDIR
2021-03-20
02 Mohit Sethi Requested Last Call review by GENART
2021-03-20
02 Mohit Sethi Requested Last Call review by SECDIR
2021-03-19
02 Mohit Sethi Notification list changed to mohit.m.sethi@ericsson.com because the document shepherd was set
2021-03-19
02 Mohit Sethi Document shepherd changed to Mohit Sethi
2021-02-11
02 Mohit Sethi Tag Doc Shepherd Follow-up Underway set.
2021-02-11
02 Mohit Sethi IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2020-12-08
02 Mohit Sethi IETF WG state changed to In WG Last Call from WG Document
2020-12-08
02 Mohit Sethi Intended Status changed to Informational from None
2020-11-02
02 Daniel Migault New version available: draft-ietf-lwig-minimal-esp-02.txt
2020-11-02
02 (System) New version accepted (logged-in submitter: Daniel Migault)
2020-11-02
02 Daniel Migault Uploaded new revision
2020-10-28
01 Daniel Migault New version available: draft-ietf-lwig-minimal-esp-01.txt
2020-10-28
01 (System) New version accepted (logged-in submitter: Daniel Migault)
2020-10-28
01 Daniel Migault Uploaded new revision
2019-10-09
00 (System) Document has expired
2019-04-15
00 Mohit Sethi This document now replaces draft-mglt-lwig-minimal-esp instead of None
2019-04-07
00 Daniel Migault New version available: draft-ietf-lwig-minimal-esp-00.txt
2019-04-07
00 (System) WG -00 approved
2019-04-02
00 Daniel Migault Set submitter to "Daniel Migault ", replaces to (none) and sent approval email to group chairs: lwig-chairs@ietf.org
2019-04-02
00 Daniel Migault Uploaded new revision