Hello Raj,

You still need the IDr and AUTH payloads in the reply. This is needed as
INVALID_SYNTAX is authenticated and encrypted.

Regards,
Matt

2009/4/22 raj singh <rsjen...@gmail.com>

> Hi Matt/Youv,
>
> Thanks for your reply.
> I will conclude as IKE_AUTH exchange MUST have TSi and TSr payload. We MUST
> NOT process IKE_AUTH packet without TSi and TSr and we should reply with
> INVALID_SYNTAX notification without IDr, AUTH, TSi and TSr payloads.
>
> Regards,
> Raj
>
>
> On Wed, Apr 22, 2009 at 1:11 PM, Yoav Nir <y...@checkpoint.com> wrote:
>
>>  Hi Raj
>>
>> Matt is correct. There is no way in IKEv2 to do a phase1-only exchange,
>> and then wait for traffic to establish the child SAs.
>>
>> While we do establish an IKE SA if the piggy-backed child SA failed for
>> whatever reason (bad selectors, no proposal chosen), we don't allow for an
>> IKE_AUTH exchange that is missing the child payloads.
>>
>> An IKE_AUTH request without the TSi and TSr payloads is
>> considered malformed, and so MUST NOT be processed. Instead, you should
>> reply with INVALID_SYNTAX
>>
>> As to question 2, the text refers to a child SA creation that failed, not
>> to one that was never attempted.
>>
>> Of course it is possible to generate that effect - propose non-existant
>> cryptographic algorithms, or IPv7 addresses in the selectors, but that IMO
>> is a misuse of the protocol.
>>
>> Yoav
>>
>> Raj Singh wrote:
>>
>> Hi Matt,
>>
>> Let me re-phrase my questions:
>> 1. If there is no TSi and TSr payload in IKE_AUTH exchange, whether we go
>> ahead and process IKE_AUTH payloads or not ?
>> 2. Appendix C: IKE_AUTH: Error in CHILD SA creation. It will come into
>> picture if we process the packet.
>>     If we go ahead and process the packet, according to appendix C, we
>> SHOULD/MUST establish the IKE SA ?
>>     Looks like, if we go ahead to process the IKE_AUTH packet with no TSi
>> and TSr, we can establish the IKEv2 SA.
>>
>> I request more experts to comment.
>>
>> Thanks for your reply.
>>
>> Regards,
>> Raj
>>
>> On Wed, Apr 22, 2009 at 12:08 PM, Matthew Cini Sarreo 
>> <mci...@gmail.com>wrote:
>>
>>>   Hello Raj,
>>>
>>> According to Appendix C, for IKE_AUTH:
>>>
>>>    error in Child SA  <--  IDr, [CERT+],
>>>    creation                AUTH,
>>>                               N(error),
>>>                               [V+]
>>>
>>> So sending an authenticated and encrypted INVALID_SYNTAX notification
>>> over the IKE_SA that has just been authenticated seems to be correct.
>>>
>>> Regards,
>>> Matt
>>>
>>>
>>>>
>>>> 2009/4/22 raj singh <rsjen...@gmail.com>
>>>>
>>>>> Hi Matt,
>>>>>
>>>>> There is possibility of just IKEv2 SA gets established during IKE_AUTH
>>>>> and IPsec SA getting established via CREATE_CHILD_SA.
>>>>> The question is what behavior RFC mandate ? What you think ?
>>>>>
>>>>> Thanks for your reply.
>>>>>
>>>>> Regards,
>>>>> Raj
>>>>>
>>>>>
>>>>> On Wed, Apr 22, 2009 at 11:40 AM, Matthew Cini Sarreo <
>>>>> mci...@gmail.com> wrote:
>>>>>
>>>>>>  In IKE_AUTH TSi and TSr are mandatory, so it is not possible to omit
>>>>>> them from an authentication exchange message, as there would be no way 
>>>>>> for
>>>>>> the SA to know what traffic should be forwarded through the SA.
>>>>>>
>>>>>> It seems that the correct error message would be INVALID_SYNTAX. This
>>>>>> would require the message ID and the checksum to be valid. Note that this
>>>>>> has (may only) be sent in an encrypted response.
>>>>>>
>>>>>> Please correct me if I am wrong.
>>>>>>
>>>>>> Regards,
>>>>>> Matt
>>>>>>
>>>>>>
>>>>>>> 2009/4/22 raj singh <rsjen...@gmail.com>
>>>>>>>
>>>>>>>>  Hi Group,
>>>>>>>>
>>>>>>>> What is the expected behavior if as a responder we do not receive
>>>>>>>> TSi and TSr in IKE_AUTH exchange ?
>>>>>>>> Shall we go ahead and establish IKEv2 SA ? If yes, shall we send out
>>>>>>>> TSi and TSr ?
>>>>>>>> Or we should reject the packet ?
>>>>>>>> If we reject the packet during packet validation with doing ID and
>>>>>>>> AUTH payload processing, what ERROR should be send ?
>>>>>>>>
>>>>>>>> Thanks,
>>>>>>>> Raj
>>>>>>>>
>>>>>>>>
>>>>>>>> _______________________________________________
>>>>>>>> IPsec mailing list
>>>>>>>> IPsec@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/ipsec
>>>>>>>>
>>>>>>>>
>>>>>>>
>>>>>>
>>>>>
>>>>
>>>
>>
>>
>> Email secured by Check Point
>>
>>
>
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to