Paul Hoffman writes: > Tero's proposed tree structure would not fit in an RFC without > trimming even more, making it even less readable. I have used > Alfred's proposed layout, but I changed the example to match it.
I think we could add some graphic lines to make it even more easier, and if we use this format we do not need to interleave the encr algorithms with the integrity algorithms, but we can group them together (I used ECNR/INTEG/ENCR/INTEG... instead of ENCR/ENCR/ENCR/INTEG/INTEG to get the picture narrower). > Please: read the example and make sure that the illustration is > correct: > > For example, one such proposal would > have two proposal structures. Proposal 1 is ESP with AES-128, AES- > 192, and AES-256 bits in CBC mode, with either HMAC-SHA1-96 or > XCBC-96 as the integrity algorithm; Proposal 2 is AES-128 or AES-256 > in GCM mode with an 8-octet ICV. Both proposals allow but do not > require the use of ESN. This can be illustrated as: SA Payload | +--- Proposal #1 ( Proto ID = ESP(3), SPI size = 4, | | 7 transforms, SPI = 0x052357bb ) | | | +-- Transform ENCR ( Name = ENCR_AES_CBC ) | | +-- Attribute ( Key Length = 128 ) | | | +-- Transform ENCR ( Name = ENCR_AES_CBC ) | | +-- Attribute ( Key Length = 192 ) | | | +-- Transform ENCR ( Name = ENCR_AES_CBC ) | | +-- Attribute ( Key Length = 256 ) | | | +-- Transform INTEG ( Name = AUTH_HMAC_SHA1_96 ) | +-- Transform INTEG ( Name = AUTH_AES_XCBC_96 ) | +-- Transform ESN ( Name = ESNs ) | +-- Transform ESN ( Name = No ESNs ) | +--- Proposal #2 ( Proto ID = ESP(3), SPI size = 4, | 4 transforms, SPI = 0x35a1d6f2 ) | +-- Transform ENCR ( Name = AES-GCM with a 8 octet ICV ) | +-- Attribute ( Key Length = 128 ) | +-- Transform ENCR ( Name = AES-GCM with a 8 octet ICV ) | +-- Attribute ( Key Length = 256 ) | +-- Transform ESN ( Name = ESNs ) +-- Transform ESN ( Name = No ESNs ) The original picture used wrong name for AUTH_AES_XCBC_96 (missing AES part), and it would be better to use "AES-GCM with a 8 octet ICV" as that is what IANA registry uses, so if no lines are used then the picture should be: SA Payload Proposal #1 ( Proto ID = ESP(3), SPI size = 4, 7 transforms, SPI = 0x052357bb ) Transform ENCR ( Name = ENCR_AES_CBC ) Attribute ( Key Length = 128 ) Transform ENCR ( Name = ENCR_AES_CBC ) Attribute ( Key Length = 192 ) Transform ENCR ( Name = ENCR_AES_CBC ) Attribute ( Key Length = 256 ) Transform INTEG ( Name = AUTH_HMAC_SHA1_96 ) Transform INTEG ( Name = AUTH_AES_XCBC_96 ) Transform ESN ( Name = No ESNs ) Transform ESN ( Name = ESNs ) Proposal #2 ( Proto ID = ESP(3), SPI size = 4, 4 transforms, SPI = 0x35a1d6f2 ) Transform ENCR ( Name = AES-GCM with a 8 octet ICV ) Attribute ( Key Length = 128 ) Transform ENCR ( Name = AES-GCM with a 8 octet ICV ) Attribute ( Key Length = 256 ) Transform ESN ( Name = No ESNs ) Transform ESN ( Name = ESNs ) -- kivi...@iki.fi _______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec