[IPsec] Generating Keying Material for the IKE_SA (IKEv2)

2010-11-21 Thread Syed Ajim Hussain
Hi All I have some doubt about Security of IKEv2 protocol. In the process Of generating Keys, every parameter is taken from IKE_SA_INIT Messages Which is un-unencrypted. If attacker using some tools capturing all the IKE Packets from network, he can easily generates

Re: [IPsec] Generating Keying Material for the IKE_SA (IKEv2)

2010-11-21 Thread Syed Ajim Hussain
As per Nicolas Williams -- The key is that eavesdroppers cannot easily compute g^ir (mod p). The initiator computes g^ir = (g^r)^i mod p, while the responder computes g^ir = (g^i)^r mod p. The initiator knows i and the responder knows r. The attacker doesn't know i, nor r, because