Hema,

On 2011-05-17 at 11:32, Hema Krishnamurthy wrote:
> Could you provide me some info on the usage of ports(remote/local) in the 
> channel manager?

Sure. I highly recommend you look at Figure 6 in the CICM Logical Model:
http://tools.ietf.org/html/draft-lanz-cicm-lm-00#section-5

I've reproduced it here.

                  Security Domain         Security Domain
                     Boundary                Boundary
                        .                       .
               +--------.--------+     +--------.--------+
    Client  --(a) Cryptographic (b)---(c) Cryptographic (d) -- Client
   Program X   |      Module     |     |      Module     |    Program Y
               +--------.--------+     +--------.--------+
                        .                       .

               X local    X remote     Y remote    Y local
               port (a)   port (b)     port (c)   port (d)

   Figure 6.  Local and Remote Port Nomenclature for Channels that
   Operate in Two Security Domains


The terms remote/local are relative to the client program. We chose these terms 
to avoid directionality (e.g., input / output) because the direction depends on 
the operation (e.g., encrypt / decrypt), but we need to specify the ports 
consistently (regardless of the operation).

Let me know if this needs more elaboration.

Lev
_______________________________________________
cicm mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/cicm

Reply via email to