I find Tero's figure easier to understand, more "illustrative". This is obviously very subjective.
Yaron > -----Original Message----- > From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf > Of a...@tr-sys.de > Sent: Wednesday, February 03, 2010 20:12 > To: ipsec@ietf.org > Subject: Re: [IPsec] IKEv2bis Issue #157 > > At Wed, 3 Feb 2010 17:20:20 +0200, Yoav Nir wrote: > > Hi all. > > > > 5 more issues. > > > > ... > > > > > > Issue #157 - Illustrate the SA payload with a diagram > > ===================================================== > > The text in 3.3 requires "peace of mind" to fully appreciate. > > A diagram might be helpful. > > > > ... > > If line formating limits hurt, you might consider to > "mirror the figure at the lower diagonal", i.e. give it > a look & feel like an asn1dump without the hex data, > or -- the ToC of the draft ! :-) > > Here's a sketch in terse notation: > > SA Payload > Proposal #1 ( Proto ID = ESP(3), SPI size = 4, > 7 transforms, SPI = 0x95903423 ) > Transform ENCR ( Name = ENCR_AES_CBC ) > Attribute ( Key Length = 128 ) > Transform INTEG ( Name = AUTH_HMAC_SHA1_96 ) > Transform ENCR ( Name = ENCR_AES_CBC ) > Attribute ( Key Length = 192 ) > Transform INTEG ( Name = AUTH_XCBC_96 ) > Transform ENCR ( Name = ENCR_AES_CBC ) > Attribute ( Key Length = 256 ) > Transform ESN ( Name = No ESNs ) > Transform ESN ( Name = ESNs ) > Proposal #2 ( Proto ID = ESP(3), SPI size = 4, > 4 transforms, SPI = 0x12345678 ) > Transform ENCR ( Name = ENCR_AES_GCM w/ 8-octet ICV ) > Attribute ( Key Length = 128 ) > Transform ESN ( Name = No ESNs ) > Transform ENCR ( Name = ENCR_AES_GCM w/ 8-octet ICV ) > Attribute ( Key Length = 256 ) > Transform ESN ( Name = ESNs ) > > Alternatively, curly braces could be added for double clarity > (you might also leave these off at lower levels): > > SA Payload { > Proposal #1 ( Proto ID = ESP(3), SPI size = 4, > 7 transforms, SPI = 0x95903423 ) { > Transform ENCR ( Name = ENCR_AES_CBC ) { > Attribute ( Key Length = 128 ) > } > Transform INTEG ( Name = AUTH_HMAC_SHA1_96 ) { } > Transform ENCR ( Name = ENCR_AES_CBC ) { > Attribute ( Key Length = 192 ) > } > Transform INTEG ( Name = AUTH_XCBC_96 ) { } > Transform ENCR ( Name = ENCR_AES_CBC ) { > Attribute ( Key Length = 256 ) > } > Transform ESN ( Name = No ESNs ) { } > Transform ESN ( Name = ESNs ) { } > } > Proposal #2 ( Proto ID = ESP(3), SPI size = 4, > 4 transforms, SPI = 0x12345678 ) { > Transform ENCR ( Name = ENCR_AES_GCM w/ 8-octet ICV ) { > Attribute ( Key Length = 128 ) > } > Transform ESN ( Name = No ESNs ) { } > Transform ENCR ( Name = ENCR_AES_GCM w/ 8-octet ICV ) { > Attribute ( Key Length = 256 ) > } > Transform ESN ( Name = ESNs ) { } > } > } > > Many variations are possible. > > Note that in the diagram in Yoav's message, the representation of > transform type 5 is not consistent with the remainder of the figure; > above, I have left off the code point (number) assigned to the ESN > transform names -- in the same way as for the other transform types. > > > Kind regards, > Alfred. > > -- > > +------------------------+--------------------------------------------+ > | TR-Sys Alfred Hoenes | Alfred Hoenes Dipl.-Math., Dipl.-Phys. | > | Gerlinger Strasse 12 | Phone: (+49)7156/9635-0, Fax: -18 | > | D-71254 Ditzingen | E-Mail: a...@tr-sys.de | > +------------------------+--------------------------------------------+ > > _______________________________________________ > IPsec mailing list > IPsec@ietf.org > https://www.ietf.org/mailman/listinfo/ipsec > > Scanned by Check Point Total Security Gateway. _______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec