I suspect that there was a typo and Yoav meant to include the flags for 
proposal 2:

| Next Payload (8 bits) | Flags (8 bits) | Fragment Counter (16 bits) | Message 
ID (32 bits) |

In that case I do prefer option 2 as it doesn't add much complexity and allows 
fragmentation.

David


> On Nov 13, 2017, at 10:51, Michael Richardson <mcr+i...@sandelman.ca> wrote:
> 
> 
> Yoav Nir <ynir.i...@gmail.com> wrote:
>> Proposal #1:
>> ==========
>> | 24 zero bits | Flags (8 bits) | Message ID (32 bits)|
> 
>> And use IIV only for regular Encrypted Payload, not for Encrypted
>> Fragment. The reasoning is that if you use fragmentation you’ve
>> already solved the message-too-big issue.
> 
>> The Flags octet includes the I(nitiator) and R(esponse) bits, which
>> differentiate the cases that are not related to fragmentation.
> 
>> Proposal #2:
>> ==========
>> | Next Payload (8 bits) | Fragment Counter (16 bits) | Message ID (32
>> bits)|
> 
>> The Fragment Counter is the same as in the RFC 7383 fragment payload,
>> or zero if we are using the regular encrypted payload.
> 
> I think that #2 does a better job.
> 
> --
> Michael Richardson <mcr+i...@sandelman.ca>, Sandelman Software Works
> -= IPv6 IoT consulting =-
> 
> 
> 
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to