Please Whitelist This Site?
I know everyone hates ads. But please understand that I am providing premium content for free that takes hundreds of hours of time to research and write. I don't want to go to a pay-only model like some sites, but when more and more people block ads, I end up working for free. And I have a family to support, just like you. :)
If you like The TCP/IP Guide, please consider the download version. It's priced very economically and you can read all of it in a convenient format without ads.
If you want to use this site for free, I'd be grateful if you could add the site to the whitelist for Adblock. To do so, just open the Adblock menu and select "Disable on tcpipguide.com". Or go to the Tools menu and select "Adblock Plus Preferences...". Then click "Add Filter..." at the bottom, and add this string: "@@||tcpipguide.com^$document". Then just click OK.
Thanks for your understanding!
Sincerely, Charles Kozierok
Author and Publisher, The TCP/IP Guide
|
NOTE: Using software to mass-download the site degrades the server and is prohibited. If you want to read The TCP/IP Guide offline, please consider licensing it. Thank you.
|
|
|
|
PPP Encryption Control Protocol (ECP) and Encryption Algorithms
(Page 3 of 4)
ECP Configuration Options and Encryption Algorithms
ECP configuration options are used
only to negotiate the type of encryption algorithm to be used by the
two devices, and the specifics of how that algorithm is to be employed.
The device initiating the negotiation sends a Configure-Request
with one option for each of the encryption algorithms it supports. The
other device compares this list of options to the algorithms it understands.
It also checks for any details relevant to the option to see if it agrees
on how that algorithm should be used. It then sends back the appropriate
reply (Ack, Nak or Reject) and a negotiation ensues
until the two devices come up with a common algorithm both understands.
If so, encryption is enabled, and otherwise, it is left turned off.
The ECP configuration options begin
with a Type value that indicates the encryption algorithm. When
the Type value is 0, this indicates that the option contains
information about a special, proprietary encryption method not covered
by any RFC standards, which can be used if both devices understand it.
Values in the range from 1 to 254 indicate encryption algorithms that
have been defined for use with ECP; at present, only two are defined.
Table 31
shows the values of the Type field, including the encryption
algorithm each corresponds to and the number of the RFC that defines
it:
Table 31: PPP Encryption Control Protocol (ECP) Encryption Algorithms
ECP Option
Type Value
|
Defining
RFC
|
Encryption
Algorithm (As Given in RFC Title)
|
0
|
|
Proprietary
|
2
|
2420
|
The
PPP Triple-DES Encryption Protocol (3DESE)
|
3
|
2419
|
The PPP
DES Encryption Protocol, Version 2 (DESE-bis)
|
Note: Type value 1 was for the original DES algorithm, defined in RFC 1969, which was superseded by DES version 2 in RFC 2419.
|
If you find The TCP/IP Guide useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider purchasing a download license of The TCP/IP Guide. Thanks for your support! |
|
|
Home -
Table Of Contents - Contact Us
The TCP/IP Guide (http://www.TCPIPGuide.com)
Version 3.0 - Version Date: September 20, 2005
© Copyright 2001-2005 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.
|