macsec 和 ipsec 的简单解释
我需要在以太网数据包上实现 IPSEC 和 MACSEC 转换(即我不需要处理设置参数、安全关联或密钥交换问题,只需在已知的情况下对数据包进行转换即可。我也可以 nick GCM/AES 实现,因此我也不必实现实际的加密。)
不幸的是,我太愚蠢了,无法理解规范。
有谁知道一个很好的简单解释,是为白痴设计的,带有图表和具体示例,说明转换应该是什么样子?
I need to implement IPSEC and MACSEC transformations on ethernet packets (i.e. I don't need to deal with setting up parameters, security associations, or key exchange issues, just do the transformations on the packets when that is already known. Also I can nick GCM/AES implementations so I don't have to implement the actual ciphering either.)
Unfortunately I am just too stupid to understand the specifications.
Does anyone know of a nice simple explanation, designed for an idiot, with diagrams and concrete examples, of what the transformations are supposed to look like?
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(2)
MACsec 提供三个子功能,即:
这些子功能使用 MACsec 密钥协商协议 (MKA) 与其他站点协商。
MACsec 使用 MACsec 密钥协商协议 (MKA) 在支持的设备之间交换和协商安全密钥。 MKA使用IEEE 802.1X-2010中规定的EAP框架进行通信
MACsec provides three sub-functions, namely:
These sub-functions are negotiated with other stations using MACsec Key Agreement protocol (MKA).
MACsec uses MACsec Key Agreement protocol (MKA) for exchange and agreement of secure keys between supported devices. MKA uses the EAP framework specified in IEEE 802.1X-2010 forcommunication
本图解指南非常适合 IPSEC
http://unixwiz.net/techtips/iguide-ipsec.html< /a>
这对于打包和解包 IP 标头非常有价值。
http://www.daemon.org/ip.html#proto
似乎有不过,MACSEC 市场存在一些缺口。
This illustrated guide is good for IPSEC
http://unixwiz.net/techtips/iguide-ipsec.html
And this was invaluable for packing and unpacking IP headers.
http://www.daemon.org/ip.html#proto
There appears to be a bit of a gap in the market for MACSEC though.