Peer Station enters CA (KaY discovers new station)
Peer in peer list with no SA
Peer Station leaves CA gracefully (?)
SA with no matching peer in peer list
Peer Station leaves CA ungracefully (?)
SA with no matching peer in peer list
LAN-level events (2)
CA becomes non-transitive or non-symmetric
Uninstall Key of SA for TX SA
MAC_Operational set to false by SecY
No action(?)
Choice of available cipher suites is changed by management, removing currently used cipher suite
Uninstall Key of SA for TX SA
Questions…
Whose job to ensure symmetric and transitive attributes of CA are not violated?
Which keys will have lifetimes?
SAK -- PN limits lifetime, nothing else needed
MK -- lifetime limits in time/frames-sent set during authorization
If a receiving SA is approaching the limit of its packet number should we attempt to initiate new SA creation? Or is it always the owner of the TX SA that creates a new SA?
How to detect non-SecY neighbors?
Announce, and Announce again upon receipt of peer’s Announce
Make changes to CA persistent with every change?
Next Steps
Further define variables need to be LMI (beyond those for SecY)