At 7:12 PM +0100 2/3/10, Alfred =?hp-roman8?B?SM5uZXM=?= wrote:
>At Wed, 3 Feb 2010 17:20:20 +0200, Yoav Nir wrote:
>> Hi all.
>>
>> 5 more issues.
>>
>> ...
>>
>>
>> Issue #157 - Illustrate the SA payload with a diagram
>> =====================================================
>> The text in 3.3 requires "peace of mind" to fully appreciate.
>> A diagram might be helpful.
>>
>> ...
>
>If line formating limits hurt, you might consider to
>"mirror the figure at the lower diagonal", i.e. give it
>a look & feel like an asn1dump without the hex data,
>or -- the ToC of the draft !  :-)
>
>Here's a sketch in terse notation:
>
>     SA Payload
>        Proposal #1 ( Proto ID = ESP(3), SPI size = 4,
>                      7 transforms,      SPI = 0x95903423 )
>           Transform  ENCR ( Name = ENCR_AES_CBC )
>              Attribute ( Key Length = 128 )
>           Transform  INTEG ( Name = AUTH_HMAC_SHA1_96 )
>           Transform  ENCR ( Name = ENCR_AES_CBC )
>              Attribute ( Key Length = 192 )
>           Transform  INTEG ( Name = AUTH_XCBC_96 )
>           Transform  ENCR ( Name = ENCR_AES_CBC )
>              Attribute ( Key Length = 256 )
>           Transform  ESN ( Name = No ESNs )
>           Transform  ESN ( Name = ESNs )
>        Proposal #2 ( Proto ID = ESP(3), SPI size = 4,
>                      4 transforms,      SPI = 0x12345678 )
>           Transform  ENCR ( Name = ENCR_AES_GCM w/ 8-octet ICV )
>              Attribute ( Key Length = 128 )
>           Transform  ESN ( Name = No ESNs )
>           Transform  ENCR ( Name = ENCR_AES_GCM w/ 8-octet ICV )
>              Attribute ( Key Length = 256 )
>           Transform  ESN ( Name = ESNs )
>
>Alternatively, curly braces could be added for double clarity
>(you might also leave these off at lower levels):
>
>     SA Payload {
>        Proposal #1 ( Proto ID = ESP(3), SPI size = 4,
>                      7 transforms,      SPI = 0x95903423 ) {
>           Transform  ENCR ( Name = ENCR_AES_CBC ) {
>              Attribute ( Key Length = 128 )
>           }
>           Transform  INTEG ( Name = AUTH_HMAC_SHA1_96 ) { }
>           Transform  ENCR ( Name = ENCR_AES_CBC ) {
>              Attribute ( Key Length = 192 )
>           }
>           Transform  INTEG ( Name = AUTH_XCBC_96 ) { }
>           Transform  ENCR ( Name = ENCR_AES_CBC ) {
>              Attribute ( Key Length = 256 )
>           }
>           Transform  ESN ( Name = No ESNs ) { }
>           Transform  ESN ( Name = ESNs ) { }
>        }
>        Proposal #2 ( Proto ID = ESP(3), SPI size = 4,
>                      4 transforms,      SPI = 0x12345678 ) {
>           Transform  ENCR ( Name = ENCR_AES_GCM w/ 8-octet ICV ) {
>              Attribute ( Key Length = 128 )
>           }
>           Transform  ESN ( Name = No ESNs ) { }
>           Transform  ENCR ( Name = ENCR_AES_GCM w/ 8-octet ICV ) {
>              Attribute ( Key Length = 256 )
>           }
>           Transform  ESN ( Name = ESNs ) { }
>        }
>     }
>
>Many variations are possible.
>
>Note that in the diagram in Yoav's message, the representation of
>transform type 5 is not consistent with the remainder of the figure;
>above, I have left off the code point (number) assigned to the ESN
>transform names -- in the same way as for the other transform types.

I definitely like Alfred's first example more than the tree diagram currently 
under discussion. The empty curly braces in the second diagram are more 
confusing that just using the indentation in the first example.

--Paul Hoffman, Director
--VPN Consortium
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to