Transforms aren't just about the encryption algorithm though (e.g., the 
extended sequence number transform). In the IP-TFS case it's not about whether 
one would enable TFS with a given encryption algorithm. Consider supporting 
and/or selecting from the set of IP-TFS with congestion control, IP-TFS without 
congestion control, no-IP-TFS, or even another future-defined TFS algorithm. 
Being able to easy negotiate these different selections was what drove me to 
the current design. :)

After coding this I will say using transforms feels like a very natural fit.

Thanks,
Chris.

> On Nov 28, 2019, at 8:49 AM, Valery Smyslov <smyslov.i...@gmail.com> wrote:
> 
> 3. I think that using new Transform Type for IP-TFS negotiation is a bad idea.
>   Transforms are best thing when combination of them matters. I don't think
>    that it is the case - negotiation of using IP-TFS is orthogonal to 
> negotiation
>    of algorithms to use. I cannot imagine that one wants to use IPTFS with 
>    say AES-GCM and doesn't want to do it with say Chacha+Poly. 
>    So I believe it is better to negotiate IPTFS by means of notifications, as 
> it is done 
>    with transport mode or WESP. So, a new notification (let call it 
> USE_IPTFS) should be 
>    introduced, which will contain data regarding whether congestion control
>    is needed and whether fragmentation is allowed. If the responder supports
>    IPTFS it will return back this notification with the data reflecting its 
> choice
>    of IPTFS features. In this case IPTFS_REQUIREMENTS notification is not 
> needed.

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to