Paul Hoffman writes:

> All good points, Valery. Here's another attempt; please check carefully.
> 
>    A single CHILD_SA negotiation may result in multiple security
>    associations.  ESP and AH SAs exist in pairs (one in each direction),
>    so two SAs are created in a single Child SA negotiation for them.
>    Furthermore, Child SA negotiation may include some future IPsec
>    protocol(s) in addition to, or instead of, ESP or AH (for example,
>    ROHC_INTEG).  In any case, keying material for each child SA MUST be
>    taken from the expanded KEYMAT using the following rules:
> 
>    o  All keys for SAs carrying data from the initiator to the responder
>       are taken before SAs going from the responder to the initiator.
> 
>    o  If multiple IPsec protocols are negotiated, keying material for
>       each Child SA is taken in the order in which the protocol headers
>       will appear in the encapsulated packet.
> 
>    o  If an IPsec protocol requires multiple keys, the order in which
>       they are taken from the SA's keying material needs to be described
>       in protocol specification.  For ESP  and AH, [IPSECARCH] defines
>       the order, namely: the encryption key (if any) MUST be taken from
>       the first bits and the integrity key (if any) MUST be taken from
>       the remaining bits.

Looks fine to me.

Regards,
Valery Smyslov.

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to