At Wed, 3 Feb 2010 17:20:20 +0200, Yoav Nir wrote:
> Hi all.
>
> 5 more issues.
>
> ...
>
>
> Issue #157 - Illustrate the SA payload with a diagram
> =====================================================
> The text in 3.3 requires "peace of mind" to fully appreciate.
> A diagram might be helpful.
>
> ...

If line formating limits hurt, you might consider to
"mirror the figure at the lower diagonal", i.e. give it
a look & feel like an asn1dump without the hex data,
or -- the ToC of the draft !  :-)

Here's a sketch in terse notation:

     SA Payload
        Proposal #1 ( Proto ID = ESP(3), SPI size = 4,
                      7 transforms,      SPI = 0x95903423 )
           Transform  ENCR ( Name = ENCR_AES_CBC )
              Attribute ( Key Length = 128 )
           Transform  INTEG ( Name = AUTH_HMAC_SHA1_96 )
           Transform  ENCR ( Name = ENCR_AES_CBC )
              Attribute ( Key Length = 192 )
           Transform  INTEG ( Name = AUTH_XCBC_96 )
           Transform  ENCR ( Name = ENCR_AES_CBC )
              Attribute ( Key Length = 256 )
           Transform  ESN ( Name = No ESNs )
           Transform  ESN ( Name = ESNs )
        Proposal #2 ( Proto ID = ESP(3), SPI size = 4,
                      4 transforms,      SPI = 0x12345678 )
           Transform  ENCR ( Name = ENCR_AES_GCM w/ 8-octet ICV )
              Attribute ( Key Length = 128 )
           Transform  ESN ( Name = No ESNs )
           Transform  ENCR ( Name = ENCR_AES_GCM w/ 8-octet ICV )
              Attribute ( Key Length = 256 )
           Transform  ESN ( Name = ESNs )

Alternatively, curly braces could be added for double clarity
(you might also leave these off at lower levels):

     SA Payload {
        Proposal #1 ( Proto ID = ESP(3), SPI size = 4,
                      7 transforms,      SPI = 0x95903423 ) {
           Transform  ENCR ( Name = ENCR_AES_CBC ) {
              Attribute ( Key Length = 128 )
           }
           Transform  INTEG ( Name = AUTH_HMAC_SHA1_96 ) { }
           Transform  ENCR ( Name = ENCR_AES_CBC ) {
              Attribute ( Key Length = 192 )
           }
           Transform  INTEG ( Name = AUTH_XCBC_96 ) { }
           Transform  ENCR ( Name = ENCR_AES_CBC ) {
              Attribute ( Key Length = 256 )
           }
           Transform  ESN ( Name = No ESNs ) { }
           Transform  ESN ( Name = ESNs ) { }
        }
        Proposal #2 ( Proto ID = ESP(3), SPI size = 4,
                      4 transforms,      SPI = 0x12345678 ) {
           Transform  ENCR ( Name = ENCR_AES_GCM w/ 8-octet ICV ) {
              Attribute ( Key Length = 128 )
           }
           Transform  ESN ( Name = No ESNs ) { }
           Transform  ENCR ( Name = ENCR_AES_GCM w/ 8-octet ICV ) {
              Attribute ( Key Length = 256 )
           }
           Transform  ESN ( Name = ESNs ) { }
        }
     }

Many variations are possible.

Note that in the diagram in Yoav's message, the representation of
transform type 5 is not consistent with the remainder of the figure;
above, I have left off the code point (number) assigned to the ESN
transform names -- in the same way as for the other transform types.


Kind regards,
  Alfred.

-- 

+------------------------+--------------------------------------------+
| TR-Sys Alfred Hoenes   |  Alfred Hoenes   Dipl.-Math., Dipl.-Phys.  |
| Gerlinger Strasse 12   |  Phone: (+49)7156/9635-0, Fax: -18         |
| D-71254  Ditzingen     |  E-Mail:  a...@tr-sys.de                     |
+------------------------+--------------------------------------------+

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to