@@ -564,37 +564,9 @@ negotiated SSKDF. The root key for the EESP SA carrying data from
564564the initiator to the responder is taken before that for the SA going
565565from the responder to the initiator.
566566
567- # [VS] Discussion: perhaps the key derivation argument can be part
568- # [VS] of the SSKDSF transform. In other words - definition of
569- # [VS] a particular SSKDF would not only the specify KDF to use, but
570- # [VS] also include its arguments. This would make key Sub SA
571- # [VS] derivation more flexible (in future it can be defined over
572- # [VS] other stuff than SPI + Session ID, e.g. over SN).
573- # [VS] Disadvantage - the SSKDF definition would become more 'heavy'
574- # [VS] and in adding new SSKDFs would in theory be more difficult
575-
576- # [VS] The Sub SA key derivation stuff should be moved to the eesp
577- # [VS] draft. This key derivation is done inside EESP and is opaque
578- # [VS] for IKE
579-
580- Using the EESP SA's root key, SK_sub, the KEYMAT for each Sub SA is
581- derived as follows:
582-
583- KEYMAT_sub = SSKDF(SK_sub, SPI | Session_ID, L)
584-
585- Where L is the total length of the key material KEYMAT_sub and the
586- salt value is comprised of the full SPI and the full Session ID of
587- the Sub SA.
588-
589- If multiple keys are required for a Sub SA, the encryption key MUST
590- be taken from the first bits of KEYMAT_sub, the integrity key MUST be
591- taken from the remaining bits.
592-
593- Keys for Sub SAs may be derived immediately or on demand when the
594- first packet is processed. Memory constrained implementations may
595- even decide to derive the Sub SA keys on the fly for each received
596- packet as only SK_sub has to be stored to derive the keys of all
597- Sub SAs.
567+ The root key and SSKDF are configured as properties of an EESP SA,
568+ which derives the keys for individual Sub SAs as specified in
569+ [[I-D.klassert-ipsecme-eesp]].
598570
599571Because individual Sub SAs can't be rekeyed, the complete EESP Child
600572SA MUST be rekeyed when either a cryptographic limit or a time-based
0 commit comments