Slicing and dicing
Karl Fox <karl@Ascend.COM> Mon, 08 September 1997 21:56 UTC
Received: (from majordom@localhost) by portal.ex.tis.com (8.8.2/8.8.2) id RAA21575 for ipsec-outgoing; Mon, 8 Sep 1997 17:56:09 -0400 (EDT)
Date: Mon, 08 Sep 1997 15:04:45 -0700
Message-Id: <199709082204.PAA15434@gump.eng.ascend.com>
From: Karl Fox <karl@Ascend.COM>
To: ipsec@tis.com
Subject: Slicing and dicing
In-Reply-To: <199709082104.OAA15064@gump.eng.ascend.com>
References: <199709082104.OAA15064@gump.eng.ascend.com>
Reply-To: Karl Fox <karl@Ascend.COM>
Organization: Ascend Communications
Sender: owner-ipsec@ex.tis.com
Precedence: bulk
While I'm on the subject of key material derivation, draft-ietf-ipsec-ciph-des-expiv-00.txt talks about comparisons with possibly-weak keys, while isakmp-oakley-04 only mentions weak and semi-weak keys. They should be consistent. Even better, they should both point to a single place where an appropriate technique is described. Also, draft-ietf-ipsec-ciph-des-expiv-00.txt says that [some document] describes the general mechanism to derive keying material for the ESP transform. The derivation of the key from some amount of keying material does not differ between the manually- and automatically-keyed security associations. Does anybody know when this document will be available? What else should we use to find out what to use for the ANX testing, the reference implementation? Is that what everybody else does? -- Karl Fox, servant of God, employee of Ascend Communications 655 Metro Place South, Suite 370, Dublin, Ohio 43017 +1 614 760 4041
- Slicing and dicing Karl Fox
- Slicing and dicing Karl Fox
- Re: Slicing and dicing Dave Mason