Hi Matt.  Because identities are not known until the IKE_AUTH exchange, it 
is always necessary to do a preliminary PAD lookup (see RFC 4301 for the 
Peer Authorization Database) based on IP address (and possibly local 
identity, depending on whether you configure that outside the PAD or 
discover that from the PAD) and to either verify the PAD entry once the 
identities are known or else do a subsequent PAD lookup using the final 
identities.  You might have even noticed in the IKE_AUTH exchange, that if 
the initiator sends the optional IDr payload, the responder is not 
obligated to use that IDr as its own identity.  So even if the initiator 
has hinted it prefers a certain IDr, it should do a second PAD lookup once 
it receives the IKE_AUTH response to verify that the negotiated SA 
conforms to its policy based on the actual IDr.

So a compliant implementation will do an initial lookup by IP address just 
as you describe, followed by a later lookup or verification using the 
identities.


Scott Moonen (smoo...@us.ibm.com)
z/OS Communications Server TCP/IP Development
http://scott.andstuff.org/
http://www.linkedin.com/in/smoonen



From:
Matthew Cini Sarreo <mci...@gmail.com>
To:
ipsec@ietf.org
Date:
04/08/2009 04:16 AM
Subject:
[IPsec] IKEv2: Possibility of "storing" configuration   (Cryptographic 
Suite) for a certain Peer



Hi everyone,

As to my understanding, in IKEv2 it is not possible to know "who" the peer 
is until IKE_AUTH, by using the ID payload for that peer. Let us say that 
an implementation chooses not to use any automatic configuration but 
decide (by manual configuration) to accept only a certain Cryptographic 
Suite. 

As an example, let us say that after a peer (initiator) sends a message to 
another peer (responder) requesting a new IKE2 SA (IKE_SA_INIT), the 
responder would reply with INVALID_KE_PAYLOAD. The configuration as above 
would not send a new IKE_SA_INIT message with a corrected D-H group but 
halt the negotiation.

In such a scenario, it might be required to have different D-H groups for 
different peers. Due to the ID payload being inexistant at this time, is 
there a way (that is allowed) to identify a peer during IKE_SA_INIT (for 
example, based on an IP address that has been stored in a configuration 
file that is known to always be for a certain peer), or are such 
identification methods (IP-based during IKE_SA_INIT just by checking the 
IP address source in the IP header of an IKE_SA_INIT message) prohibited?

P.S this point comes from the IKEv2 RFC, section 2.6 (IKE SA SPIs and 
Cookies), par. 2 which states:
"Incoming IKE packets are mapped to an IKE SA only using the packet's SPI, 
not using (for example) the source IP address of the packet."
But the "identification" for fixed configuration purposes would be before 
this, as the packet would not be mapped to an SA, but a configuration for 
the SA resulting my that message would be loaded from configuration.

Regards,
Matt_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to