Slicing and dicing

Karl Fox <karl@Ascend.COM> Mon, 08 September 1997 21:56 UTC

Received: (from majordom@localhost) by portal.ex.tis.com (8.8.2/8.8.2) id RAA21575 for ipsec-outgoing; Mon, 8 Sep 1997 17:56:09 -0400 (EDT)
Date: Mon, 08 Sep 1997 15:04:45 -0700
Message-Id: <199709082204.PAA15434@gump.eng.ascend.com>
From: Karl Fox <karl@Ascend.COM>
To: ipsec@tis.com
Subject: Slicing and dicing
In-Reply-To: <199709082104.OAA15064@gump.eng.ascend.com>
References: <199709082104.OAA15064@gump.eng.ascend.com>
Reply-To: Karl Fox <karl@Ascend.COM>
Organization: Ascend Communications
Sender: owner-ipsec@ex.tis.com
Precedence: bulk

While I'm on the subject of key material derivation,
draft-ietf-ipsec-ciph-des-expiv-00.txt talks about comparisons with
possibly-weak keys, while isakmp-oakley-04 only mentions weak and
semi-weak keys.  They should be consistent.  Even better, they should
both point to a single place where an appropriate technique is
described.

Also, draft-ietf-ipsec-ciph-des-expiv-00.txt says that

   [some document] describes the general mechanism to derive keying
   material for the ESP transform. The derivation of the key from some
   amount of keying material does not differ between the manually- and
   automatically-keyed security associations.

Does anybody know when this document will be available?  What else
should we use to find out what to use for the ANX testing, the
reference implementation?

Is that what everybody else does?
-- 
Karl Fox, servant of God, employee of Ascend Communications
655 Metro Place South, Suite 370, Dublin, Ohio  43017   +1 614 760 4041