On Fri, 8 Jan 2016, Valery Smyslov wrote:

 Third, I haven’t tested this myself, so I may be all wrong here, but I
 question the value of compression on IKE.
 IKE is a binary protocol with mostly compact binary payloads. Even the
 list of supported CAs is a list of hashes in IKEv2.
 How much can compression help?

It depends on the particular content of the messages. Those payloads that contain random (or randomly-looking) data like Nonce, KE, most VIDs are almost uncompressable. However the content of SA payload contains so many zeroes that it can be compressed of up to 90%. So, if your IKE_SA_INIT's SA payload contains only a couple of transforms, the saving is minimal - about few tens of bytes. However if it contains a long list of transforms, then you could make initial message 30% or even twice as small comparing to no compression.

But IoT devices would likely only suggest one or at most two transforms
anyway? Not a long list?

And IKE_AUTH messages often contains a certificates, that is usually compressable by 30%.

I thought IoT devices did not even have the memory to do X.509, which is
why raw public keys were added to TLS ?

Paul

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to