At 7:44 PM +0200 2/8/10, Tero Kivinen wrote:
>Paul Hoffman writes:
>> Tero's proposed tree structure would not fit in an RFC without
>> trimming even more, making it even less readable. I have used
>> Alfred's proposed layout, but I changed the example to match it.
>
>I think we could add some graphic lines to make it even more easier,
>and if we use this format we do not need to interleave the encr
>algorithms with the integrity algorithms, but we can group them
>together (I used ECNR/INTEG/ENCR/INTEG... instead of
>ENCR/ENCR/ENCR/INTEG/INTEG to get the picture narrower).
>
>> Please: read the example and make sure that the illustration is
>> correct:
>>
>>    For example, one such proposal would
>>    have two proposal structures.  Proposal 1 is ESP with AES-128, AES-
>>    192, and AES-256 bits in CBC mode, with either HMAC-SHA1-96 or
>>    XCBC-96 as the integrity algorithm; Proposal 2 is AES-128 or AES-256
>>    in GCM mode with an 8-octet ICV.  Both proposals allow but do not
>>    require the use of ESN.  This can be illustrated as:
>
>  SA Payload
>     |
>     +--- Proposal #1 ( Proto ID = ESP(3), SPI size = 4,
>     |     |            7 transforms,      SPI = 0x052357bb )
>     |     |
>     |     +-- Transform ENCR ( Name = ENCR_AES_CBC )
>     |     |     +-- Attribute ( Key Length = 128 )
>     |     |
>     |     +-- Transform ENCR ( Name = ENCR_AES_CBC )
>     |     |     +-- Attribute ( Key Length = 192 )
>     |     |
>     |     +-- Transform ENCR ( Name = ENCR_AES_CBC )
>     |     |     +-- Attribute ( Key Length = 256 )
>     |     |
>     |     +-- Transform INTEG ( Name = AUTH_HMAC_SHA1_96 )
>     |     +-- Transform INTEG ( Name = AUTH_AES_XCBC_96 )
>     |     +-- Transform ESN ( Name = ESNs )
>     |     +-- Transform ESN ( Name = No ESNs )
>     |
>     +--- Proposal #2 ( Proto ID = ESP(3), SPI size = 4,
>           |            4 transforms,      SPI = 0x35a1d6f2 )
>           |
>           +-- Transform ENCR ( Name = AES-GCM with a 8 octet ICV )
>           |     +-- Attribute ( Key Length = 128 )
>           |
>           +-- Transform ENCR ( Name = AES-GCM with a 8 octet ICV )
>           |     +-- Attribute ( Key Length = 256 )
>           |
>           +-- Transform ESN ( Name = ESNs )
>           +-- Transform ESN ( Name = No ESNs )
>
>
>The original picture used wrong name for AUTH_AES_XCBC_96 (missing AES
>part), and it would be better to use "AES-GCM with a 8 octet ICV" as
>that is what IANA registry uses, so if no lines are used then the
>picture should be:
>
>   SA Payload
>      Proposal #1 ( Proto ID = ESP(3), SPI size = 4,
>                    7 transforms,      SPI = 0x052357bb )
>         Transform  ENCR ( Name = ENCR_AES_CBC )
>            Attribute ( Key Length = 128 )
>         Transform  ENCR ( Name = ENCR_AES_CBC )
>            Attribute ( Key Length = 192 )
>         Transform  ENCR ( Name = ENCR_AES_CBC )
>            Attribute ( Key Length = 256 )
>         Transform  INTEG ( Name = AUTH_HMAC_SHA1_96 )
>         Transform  INTEG ( Name = AUTH_AES_XCBC_96 )
>         Transform  ESN ( Name = No ESNs )
>         Transform  ESN ( Name = ESNs )
>      Proposal #2 ( Proto ID = ESP(3), SPI size = 4,
>                    4 transforms,      SPI = 0x35a1d6f2 )
>         Transform  ENCR ( Name = AES-GCM with a 8 octet ICV )
>            Attribute ( Key Length = 128 )
>         Transform  ENCR ( Name = AES-GCM with a 8 octet ICV )
>            Attribute ( Key Length = 256 )
>         Transform  ESN ( Name = No ESNs )
>         Transform  ESN ( Name = ESNs )

Thanks! I like the version with the lines even better, and I don't think it 
makes the figure too tal.

--Paul Hoffman, Director
--VPN Consortium
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to