One document matched: draft-thayer-seccomp-01.txt
Differences from draft-thayer-seccomp-00.txt
Network Working Group R. Thayer
Expire in six months Sable Technology
Internet Draft March 1997
Compression Payload for Use with IP Security
<draft-thayer-seccomp-01.txt>
Status of this Memo
This document is an Internet-Draft. Internet-Drafts are working
documents of the Internet Engineering Task Force (IETF), its
areas, and its working groups. Note that other groups may also
distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other
documents at any time. It is inappropriate to use Internet-
Drafts as reference material or to cite them other than as ``work
in progress.''
To learn the current status of any Internet-Draft, please check
the ``1id-abstracts.txt'' listing contained in the Internet-
Drafts Shadow Directories on ftp.is.co.za (Africa), nic.nordu.net
(Europe), munnari.oz.au (Pacific Rim), ds.internic.net (US East
Coast), or ftp.isi.edu (US West Coast).
Abstract
This document describes a payload format to be used to store
compressed protocol messages within an IP packet which is using
security features as defined in [RFC-1825].
TABLE OF CONTENTS
STATUS OF THIS MEMO.............................................1
ABSTRACT........................................................1
1. INTRODUCTION.................................................2
2. USE OF COMPRESSION FOR IP PACKETS............................2
2.1 INTERACTION WITH AH/ESP.....................................2
2.1.1 Relationship to Combined Transforms .....................3
3. COMPRESSION PAYLOAD MESSAGE FORMAT...........................3
3.1 NEXT PAYLOAD................................................3
Thayer [Page 1]
Internet Draft IP Compression with IPSEC Page 2
3.2 TYPE........................................................3
3.3 OPTIONS.....................................................3
3.4 IDENT.......................................................3
3.5 LENGTH......................................................4
4. SECURITY CONSIDERATIONS......................................4
5. REFERENCES...................................................4
6. AUTHOR'S ADDRESS.............................................5
1. Introduction
The introduction of security into packets transmitted using
Internet IP (Version 4) [RFC-791] causes a change in the
applicability of compression technology to data communications.
Specifically, when a packet is encrypted, it becomes essentially
random data, and therefore is highly incompressible. This makes
it difficult to use conventional techniques to compress IP
datagrams, such as PPP compression. To solve this problem it
becomes desirable to compress the data before it is encapsulated
with security features.
2. Use of Compression for IP packets
The process of using data compression techniques for IP packets
is a matter of processing the data in the following order, if IP
Security is present:
a. Source node generates packet
b. IP packet is compressed
c. (optional) ESP transform is applied to IP packet
d. AH transform is applied to IP packet
e. IP packet is transmitted
Note that compression occurs BEFORE encryption.
2.1 Interaction with AH/ESP
Since the 'payload' as seen by ESP (or AH) is no longer IPv4 or
IPv6, the payload type field used with ESP, e.g. [Hughes] or AH
[Atkinson] must specify a value indicating this is compressed.
For purposes of this discussion draft, the value 99 should be
used. This is defined in [RFC-1700] as "any private encryption
scheme" and has been used by implementors in the past for
Thayer [Page 2]
Internet Draft IP Compression with IPSEC Page 3
compression [Thayer]. It is assumed that some more proper value
from IANA will be eventually chosen.
2.1.1 Relationship to Combined Transforms
Since there is no compression scheme ('bit') defined in the ESP
transforms under discussion at the time of publication, this
draft still represents a relevant proposal. As before, the
proposal is to simply do the compression outside of ESP.
3. Compression Payload Message Format
(Byte 0) (Byte 3)
+------------+-----------+-------------+-----------+
|Next Payload| Type | Options |
+------------+-----------+-------------+-----------+
| Ident | Length |
+------------+-----------+-------------+-----------+
| ... compressed data ... +
3.1 Next Payload
is the type field of the next level of data, from [RFC-1700].
Note this is typically IPv4 or IPv6.
3.2 Type
is the dialect of compression to use. The following values are
predefined, others are t.b.d.
0 = no compression, pass-through
1 = ZLIB compression [ZLIB]
2 = Hi/Fn
3 = IBM ALDC
4 = private scheme
5..255 - undefined
3.3 Options
This is a 16-bit field containing options for compression. The
only bit defined at this time is:
0x0001 = flush history after this packet.
Use of this field is specific to the compression dialect. The
value defined here is specifically for use with ZLIB.
3.4 Ident
Thayer [Page 3]
Internet Draft IP Compression with IPSEC Page 4
This is an identifier for this packet. It may be used to
determine if packets have been dropped or for other purposes.
The field is 16 bits wide. The range of the identifier is
dialect-specific. For dialect 0 (pass-through) it must be
0..65535. For dialect 1 (ZLIB) it must be in the range 0..255.
3.5 Length
This is the length of the actual compressed data, in bytes. It
is not necessary for the compressed data to be a multiple of 4
bytes. This counder covers the data only, not the header fields.
4. Security Considerations
This protocol is specifically for use in an IP Security Context.
It therefore is explicitly NOT intended to handle encryption
(since ESP is doing that) or authentication (since AH is doing
that).
5. References
[Atkinson] R. Atkinson, `IP Authentication Header'', draft-ietf-
ipsec-auth-header-00.txt
[Hughes] J. Hughes, ``Combined DES-CBC, HMAC and Replay
Prevention Security'' June 1996, Internet Draft draft-ietf-
ipsec-esp-des-md5-02.txt
[RFC-1700] J. Reynolds, J. Postel, "ASSIGNED NUMBERS",
10/20/1994. (Pages=230) (Format=.txt) (Obsoletes RFC1340) (STD 2)
[RFC-1825] R. Atkinson, "Security Architecture for the Internet
Protocol", 08/09/1995. (Pages=22) (Format=.txt)
[RFC-791] J. Postel, "Internet Protocol", 09/01/1981. (Pages=45)
(Format=.txt)
[Thayer] R. Thayer, ``WHR Accelerator Compression Encapsulation
Protocol', March 1994, presented at Compression BOF at Seattle
IETF.
[ZLIB] L. P. Deutsch, J. Gailly, ``ZLIB Compressed Data Format
Specification version 3.3', draft-deutsch-zlib-spec-01.txt
Thayer [Page 4]
Internet Draft IP Compression with IPSEC Page 5
6. Author's Address
Rodney Thayer
Sable Technology Corporation
246 Walnut Street
Newton Massachusetts 02160
rodney@sabletech.com
+1 617 332 7292
Thayer [Page 5]
| PAFTECH AB 2003-2026 | 2026-04-22 22:48:46 |