At 7:44 PM +0200 2/8/10, Tero Kivinen wrote: >Paul Hoffman writes: >> Tero's proposed tree structure would not fit in an RFC without >> trimming even more, making it even less readable. I have used >> Alfred's proposed layout, but I changed the example to match it. > >I think we could add some graphic lines to make it even more easier, >and if we use this format we do not need to interleave the encr >algorithms with the integrity algorithms, but we can group them >together (I used ECNR/INTEG/ENCR/INTEG... instead of >ENCR/ENCR/ENCR/INTEG/INTEG to get the picture narrower). > >> Please: read the example and make sure that the illustration is >> correct: >> >> For example, one such proposal would >> have two proposal structures. Proposal 1 is ESP with AES-128, AES- >> 192, and AES-256 bits in CBC mode, with either HMAC-SHA1-96 or >> XCBC-96 as the integrity algorithm; Proposal 2 is AES-128 or AES-256 >> in GCM mode with an 8-octet ICV. Both proposals allow but do not >> require the use of ESN. This can be illustrated as: > > SA Payload > | > +--- Proposal #1 ( Proto ID = ESP(3), SPI size = 4, > | | 7 transforms, SPI = 0x052357bb ) > | | > | +-- Transform ENCR ( Name = ENCR_AES_CBC ) > | | +-- Attribute ( Key Length = 128 ) > | | > | +-- Transform ENCR ( Name = ENCR_AES_CBC ) > | | +-- Attribute ( Key Length = 192 ) > | | > | +-- Transform ENCR ( Name = ENCR_AES_CBC ) > | | +-- Attribute ( Key Length = 256 ) > | | > | +-- Transform INTEG ( Name = AUTH_HMAC_SHA1_96 ) > | +-- Transform INTEG ( Name = AUTH_AES_XCBC_96 ) > | +-- Transform ESN ( Name = ESNs ) > | +-- Transform ESN ( Name = No ESNs ) > | > +--- Proposal #2 ( Proto ID = ESP(3), SPI size = 4, > | 4 transforms, SPI = 0x35a1d6f2 ) > | > +-- Transform ENCR ( Name = AES-GCM with a 8 octet ICV ) > | +-- Attribute ( Key Length = 128 ) > | > +-- Transform ENCR ( Name = AES-GCM with a 8 octet ICV ) > | +-- Attribute ( Key Length = 256 ) > | > +-- Transform ESN ( Name = ESNs ) > +-- Transform ESN ( Name = No ESNs ) > > >The original picture used wrong name for AUTH_AES_XCBC_96 (missing AES >part), and it would be better to use "AES-GCM with a 8 octet ICV" as >that is what IANA registry uses, so if no lines are used then the >picture should be: > > SA Payload > Proposal #1 ( Proto ID = ESP(3), SPI size = 4, > 7 transforms, SPI = 0x052357bb ) > Transform ENCR ( Name = ENCR_AES_CBC ) > Attribute ( Key Length = 128 ) > Transform ENCR ( Name = ENCR_AES_CBC ) > Attribute ( Key Length = 192 ) > Transform ENCR ( Name = ENCR_AES_CBC ) > Attribute ( Key Length = 256 ) > Transform INTEG ( Name = AUTH_HMAC_SHA1_96 ) > Transform INTEG ( Name = AUTH_AES_XCBC_96 ) > Transform ESN ( Name = No ESNs ) > Transform ESN ( Name = ESNs ) > Proposal #2 ( Proto ID = ESP(3), SPI size = 4, > 4 transforms, SPI = 0x35a1d6f2 ) > Transform ENCR ( Name = AES-GCM with a 8 octet ICV ) > Attribute ( Key Length = 128 ) > Transform ENCR ( Name = AES-GCM with a 8 octet ICV ) > Attribute ( Key Length = 256 ) > Transform ESN ( Name = No ESNs ) > Transform ESN ( Name = ESNs )
Thanks! I like the version with the lines even better, and I don't think it makes the figure too tal. --Paul Hoffman, Director --VPN Consortium _______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec