Skip to content

Commit 4e12d3f

Browse files
committed
eesp-ikev2.org : rewrite Sender ID.
Change from MUST to MAY.
1 parent 24de3ce commit 4e12d3f

File tree

1 file changed

+42
-13
lines changed

1 file changed

+42
-13
lines changed

eesp-ikev2.org

Lines changed: 42 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -386,23 +386,52 @@ Sub SAs must rekeyed.
386386

387387
** Multiple Sender Group SA Key Derivation
388388

389-
When using EESP with a group SA, as specified in
390-
[[I-D.ietf-ipsecme-g-ikev2]], the Sender-ID MUST be used for
391-
deriving a unique key for each sender. This ensures that each
392-
sender maintains a distinct IV and/or sequence number space.
393-
When using independent keys, the Implicit IV (IIV) transforms
394-
may be used.
389+
When an EESP implementation uses a group SA with multiple senders,
390+
as specified in [[I-D.ietf-ipsecme-g-ikev2]], it MAY use the Sender-ID
391+
to derive a unique key for each sender. Using the Sender-ID ensures
392+
that each sender maintains a distinct sequence number space and
393+
initialization vector (IV). Implementations MAY also use
394+
Implicit IV (IIV) transforms, [[RFC8750]] with independent sequence
395+
number space.
396+
397+
Replay protection for multiple senders is only feasible when the
398+
when sequence number space is independent for each senders.
399+
If an implementation requires replay protection in a multi-sender
400+
environment, it MUST use the Sender-ID Sub SA. The Sender-ID MUST
401+
be carried in each packet within the Session ID field, providing
402+
an efficient mechanism for key differentiation to protect data
403+
confidentiality and integrity.
404+
405+
If the Session ID is used to carry the Sender-ID, the maximum length
406+
of GWP_SENDER_ID_BITS in the GCKS policy MUST NOT exceed 16 bits.
395407

396-
The Sender-ID is carried in each packet within the Session ID
397-
field, allowing efficient and reliable key differentiation for
398-
data security and integrity.
399408

400-
The maximum length of GWP_SENDER_ID_BITS in GCKS policy
401-
is 16 bits when using the Session ID to carry the Sender-ID.
409+
** Multiple Sender Group SA Key Derivation
402410

403-
[Note: we could allow 32 bit or any lenght field for
411+
When an EESP implementation uses a group Security Association (SA)
412+
with multiple senders, as specified in [[I-D.ietf-ipsecme-g-ikev2]],
413+
it MAY use the Sender-ID to derive a unique key for each sender.
414+
If the Sender-ID is used for unique key derivation, each sender
415+
would maintain a distinct Sequence Number space hence, distinct
416+
initialization vector (IV). Also the implementations MAY use
417+
Implicit IV (IIV) transforms for independent keys.
418+
419+
Replay protection for multiple senders is only feasible when the
420+
Sender-ID is used and independent keys are derive. If an
421+
implementation requires replay protection in a multi-sender
422+
environment, it MUST use the Sender-ID. The Sender-ID MUST be
423+
carried in each packet within the Session ID field, thereby
424+
providing an efficient and reliable mechanism for key
425+
differentiation to protect data confidentiality and integrity.
426+
427+
If the Session ID is used to carry the Sender-ID, the maximum
428+
length of GWP_SENDER_ID_BITS in the GCKS policy MUST NOT exceed
429+
16 bits.
430+
431+
[Note: we could allow 32 bit or any length field for
404432
GWP_SENDER_ID_BITS then it would have be carried in
405-
a EESP Options TLV and not in Session ID]
433+
a EESP Options TLV and not in Session ID. Should we
434+
define a seperate TLV for the Group Sender ID?]
406435

407436
* Session ID
408437

0 commit comments

Comments
 (0)