⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2411.txt

📁 <VC++网络游戏建摸与实现>源代码
💻 TXT
📖 第 1 页 / 共 2 页
字号:
Network  Working Group                                        R. ThayerRequest for Comments: 2411                 Sable Technology CorporationCategory: Informational                                    N. Doraswamy                                                           Bay Networks                                                               R. Glenn                                                                   NIST                                                          November 1998                              IP Security                            Document RoadmapStatus of this Memo   This memo provides information for the Internet community.  It does   not specify an Internet standard of any kind.  Distribution of this   memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1998).  All Rights Reserved.Abstract   The IPsec protocol suite is used to provide privacy and   authentication services at the IP layer.  Several documents are used   to describe this protocol suite.  The interrelationship and   organization of the various documents covering the IPsec protocol are   discussed here.  An explanation of what to find in which document,   and what to include in new Encryption Algorithm and Authentication   Algorithm documents are described.Table of Contents   1. Introduction ................................................2   2. Interrelationship of IPsec Documents ........................2   3. Keying Material .............................................4   4. Recommended Content of Algorithm Documents ..................5   4.1 Encryption and Authentication Algorithms ...................5   4.2 Encryption Algorithms ......................................6   4.3 Authentication Algorithms ..................................7   5. Security Considerations .....................................8   6. Acknowledgments .............................................8   7. References ..................................................9   8. Authors' Addresses .........................................10   9. Full Copyright Statement ...................................11Thayer, et. al.              Informational                      [Page 1]RFC 2411              IP Security Document Roadmap         November 19981. Introduction   This document is intended to provide guidelines for the development   of collateral specifications describing the use of new encryption and   authentication algorithms with the ESP protocol, described in [ESP]   and new authentication algorithms used with the AH protocol,   described in [AH].  ESP and AH are part of the IP Security   architecture described in [Arch].  There is a requirement for a   well-known procedure that can be used to add new encryption   algorithms or authentication algorithms to ESP and AH, not only while   the initial document set is undergoing development but after the base   documents have achieved RFC status.  Following the guidelines   discussed below simplifies adding new algorithms and reduces that   amount of redundant documentation.   The goal in writing a new Encryption Algorithm or Authentication   Algorithm document is to concentrate on the application of the   specific algorithm within ESP and AH.  General ESP and AH concepts,   definitions, and issues are covered in the ESP and AH documents. The   algorithms themselves are not described in these documents.  This   gives us the capability to add new algorithms and also specify how   any given algorithm might interact with other algorithms. The intent   is to achieve the goal of avoiding duplication of information and   excessive numbers of documents, the so-called "draft explosion"   effect.2. Interrelationship of IPsec Documents   The documents describing the set of IPsec protocols are divided into   seven groups.  This is illustrated in Figure 1.  There is a main   Architecture document which broadly covers the general concepts,   security requirements, definitions, and mechanisms defining IPsec   technology.   There is an ESP Protocol document and an AH Protocol document which   covers the packet format and general issues regarding the respective   protocols.  These protocol documents also contain default values if   appropriate, such as the default padding contents, and mandatory to   implement algorithms.  These documents dictate some of the values in   the Domain Of Interpretation document [DOI].  Note the DOI document   is itself part of the IANA Assigned Numbers mechanism and so the   values described in the DOI are well-known.  See [DOI] for more   information on the mechanism.   The "Encryption Algorithm" document set, shown on the left, is the   set of documents describing how various encryption algorithms are   used for ESP.  These documents are intended to fit in this roadmap,   and should avoid overlap with the ESP protocol document and with theThayer, et. al.              Informational                      [Page 2]RFC 2411              IP Security Document Roadmap         November 1998   Authentication Algorithm documents.  Examples of this document are   the [DES-Detroit] and [CBC] documents.  When these or other   encryption algorithms are used for ESP, the DOI document has to   indicate certain values, such as an encryption algorithm identifier,   so these documents provide input to the DOI.   The "Authentication Algorithm" document set, shown on the right, is   the set of documents describing how various authentication algorithms   are used for both ESP and AH.  These documents are intended to fit in   this roadmap, and should avoid overlap with the AH protocol document   and with the Encryption Algorithm documents.  Examples of this   document are the [HMAC-MD5], and [HMAC-SHA-1] documents.  When these   or other algorithms are used for either ESP or AH, the DOI document   has to indicate certain values, such as algorithm type, so these   documents provide input to the DOI.   The "Key Management Documents", shown at the bottom, are the   documents describing the IETF standards-track key management schemes.   These documents provide certain values for the DOI also.  Note that   issues of key management should be indicated here and not in, for   example, the ESP and AH protocol documents.  Currently this box   represents [ISAKMP], [Oakley], and [Resolution].   The DOI document, shown in the middle, contains values needed for the   other documents to relate to each other.  This includes for example   encryption algorithms, authentication algorithms, and operational   parameters such as key lifetimes.Thayer, et. al.              Informational                      [Page 3]RFC 2411              IP Security Document Roadmap         November 1998                      +--------------+                      | Architecture |                      +--------------+                        v          v               +<-<-<-<-+          +->->->->+               v                            v      +----------+                       +----------+      |   ESP    |                       |    AH    |      | Protocol |                       | Protocol |      +----------+                       +----------+        v      v                           v       v        v      +->->->->->->->->+          v       v        v      v                v          v       v        v      v                v          v       v        v  +------------+     +----------------+   v        v  | +------------+   | +----------------+ v        v  | | Encryption |   | | Authentication | v        v  +-| Algorithm  |   +-| Algorithm      | v        v    +------------+     +----------------+ v        v        v                       v         v        v        v        +-----+        v         v        +>->->->-+->->->->| DOI |<-<-<-<-+-<-<-<-<-+                          +-----+                             ^                             ^                       +------------+                       |    KEY     |                       | MANAGEMENT |                       +------------+              Figure 1. IPsec Document Roadmap.3. Keying Material   Describing the encryption and authentication algorithms in different   documents raises the issue of how the key management protocols knows   the required keying material length for the desired algorithms when   used together with ESP.  It also raises the issue of how to divide   the keying material.  This is known as the "slicing and dicing"   information.   Each Encryption Algorithm and Authentication Algorithm document   should specify their respective key attributes (e.g. how to pad,   location of parity bits, key order for multi-keyed algorithms, and   length).  The key management protocols should use the length of the   keys specified in the respective Algorithm documents to generate the   keying material of required length.Thayer, et. al.              Informational                      [Page 4]RFC 2411              IP Security Document Roadmap         November 1998   The key management protocol generates keying material with enough   strength and size to generate keys for individual algorithms. The   IPsec Architecture document specifies how keys are extracted from a   single block of keying material when multiple keys are required (e.g.   ESP with authentication).  The Encryption Algorithm and   Authentication Algorithm documents are responsible for specifying the   key sizes and strengths for each algorithm. However, whether the   entire keying material is passed down to the kernel to perform   slicing and dicing or if the keys are sliced and diced by key   management protocol is an implementation issue. The AH protocol   document has no such requirement.4. Recommended Content of Algorithm Documents   The document describing how a specific encryption or authentication   algorithm is used should contain information appropriate to that   encryption or authentication algorithm.  This section enumerates what   information should be provided.  It is the intention of the document   roadmap that:   .  General protocol information goes in the respective ESP or AH      protocol documents.   .  Key management information goes in the key management documents.   .  Assigned values and constants of negotiable items go in the DOI      document.   Encryption and authentication algorithms require some set of optional   parameters or have optional modes of operation (e.g. IVs,   authentication data lengths, and key lengths).  To help eliminate   some complexity involved with key management having to negotiate   large numbers of algorithm-specific parameters, encryption and   authentication algorithm documents will select fixed values for these   parameters when it is deemed technically reasonable and feasible.   Note, the following information is intended as a general guideline   only.4.1 Encryption and Authentication Algorithms   This section describes the information that should be included in   both Encryption Algorithm and Authentication Algorithm documents.   Keying Material   .  Size of keys, including minimum, maximum, recommended and/or      required sizes.  Note: the security considerations section should      address any weakness in specific sizes.Thayer, et. al.              Informational                      [Page 5]RFC 2411              IP Security Document Roadmap         November 1998   .  Recommended or required pseudo-random number generator techniques      and attributes to provide sufficiently strong keys.  [RANDOM]      provides recommendations on generating strong randomness for use      with security.   .  Format of keying material.   .  Known weak keys or references to documentation on known weak keys.   .  Recommended or required processing of input keying material such      as parity generation or checking.   .  Requirements and/or recommendations on how often the keying      material should be refreshed.   Performance Considerations   .  Any available estimates on performance of this algorithm.   .  Any available comparison data  (e.g., compared against DES or      MD5).   .  Input size or other considerations that could improve or degrade      performance.   ESP Environmental Considerations   .  Any known issues regarding interactions between this algorithm and      other aspects of ESP, such as use of certain authentication      schemes.  Note:  As new encryption and authentication algorithms      are applied to ESP, the later documents will be required to      address interactions with previously specified algorithms.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -