Re: [IPsec] #121: Rekeying IKE SAs: KEr errors and PRF question
<Pasi.Eronen@nokia.com> Tue, 24 November 2009 12:24 UTC
Return-Path: <Pasi.Eronen@nokia.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A47AE3A6A32 for <ipsec@core3.amsl.com>; Tue, 24 Nov 2009 04:24:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.421
X-Spam-Level:
X-Spam-Status: No, score=-6.421 tagged_above=-999 required=5 tests=[AWL=0.178, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aD3b9TYjniN1 for <ipsec@core3.amsl.com>; Tue, 24 Nov 2009 04:24:13 -0800 (PST)
Received: from mgw-mx03.nokia.com (smtp.nokia.com [192.100.122.230]) by core3.amsl.com (Postfix) with ESMTP id 84F143A69C0 for <ipsec@ietf.org>; Tue, 24 Nov 2009 04:24:12 -0800 (PST)
Received: from esebh105.NOE.Nokia.com (esebh105.ntc.nokia.com [172.21.138.211]) by mgw-mx03.nokia.com (Switch-3.3.3/Switch-3.3.3) with ESMTP id nAOCNdPW013132; Tue, 24 Nov 2009 14:24:04 +0200
Received: from vaebh104.NOE.Nokia.com ([10.160.244.30]) by esebh105.NOE.Nokia.com with Microsoft SMTPSVC(6.0.3790.3959); Tue, 24 Nov 2009 14:24:03 +0200
Received: from vaebh101.NOE.Nokia.com ([10.160.244.22]) by vaebh104.NOE.Nokia.com with Microsoft SMTPSVC(6.0.3790.3959); Tue, 24 Nov 2009 14:23:54 +0200
Received: from smtp.mgd.nokia.com ([65.54.30.6]) by vaebh101.NOE.Nokia.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.3959); Tue, 24 Nov 2009 14:23:50 +0200
Received: from NOK-EUMSG-01.mgdnok.nokia.com ([65.54.30.106]) by nok-am1mhub-02.mgdnok.nokia.com ([65.54.30.6]) with mapi; Tue, 24 Nov 2009 13:23:49 +0100
From: Pasi.Eronen@nokia.com
To: paul.hoffman@vpnc.org, ipsec@ietf.org
Date: Tue, 24 Nov 2009 13:23:48 +0100
Thread-Topic: [IPsec] #121: Rekeying IKE SAs: KEr errors and PRF question
Thread-Index: Acpsm8sXtHRhGMW6TEqZPZ3rsv2gxQAY5pOg
Message-ID: <808FD6E27AD4884E94820BC333B2DB774F310BBF5B@NOK-EUMSG-01.mgdnok.nokia.com>
References: <p06240845c730d6c840bf@[10.20.30.158]>
In-Reply-To: <p06240845c730d6c840bf@[10.20.30.158]>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginalArrivalTime: 24 Nov 2009 12:23:50.0316 (UTC) FILETIME=[FA7946C0:01CA6D00]
X-Nokia-AV: Clean
Subject: Re: [IPsec] #121: Rekeying IKE SAs: KEr errors and PRF question
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Nov 2009 12:24:13 -0000
Paul Hoffman wrote: > We earlier agreed in issue #50 to make the KEr in Section 1.3.2 > (Rekeying IKE SAs with the CREATE_CHILD_SA Exchange) mandatory: > <-- HDR, SK {SA, Nr, KEr} > Note that this is not in the current draft, but will be in the next > one. > > So, what happens if the responder does not include a KEr, following the > syntax in RFC 4306? This would happen only if the responder's SA payload has value "NONE" for transform type 4, right? But the text in Section 2.18 already prohibits this... > Does the process revert back to using only the SK_d and the new > nonces, or does the responder reject the request and indicate its > preferred DH group in the INVALID_KE_PAYLOAD notification payload > (section 1.3)? The latter seems much more likely, given the text in > 2.18. If so, we should say so explicitly. > > Section 2.18 also states that in the case of the old and new IKE SA > selecting different PRFs, that the rekeying exchange (for SKEYSEED) is > done using the *old* IKE SA's PRF. What happens after that? The end > of section 2.18 says that SK_d, etc are computed from SKEYSEED as > specified in section 2.14. If the PRF changed, which PRF is used for > the prf+ calculations, the old PRF or the new PRF? SK_* are computed from SKEYSEED using the new IKE SA's PRF. Best regards, Pasi
- [IPsec] #121: Rekeying IKE SAs: KEr errors and PR… Paul Hoffman
- Re: [IPsec] #121: Rekeying IKE SAs: KEr errors an… Pasi.Eronen
- [IPsec] #121: Rekeying IKE SAs: KEr errors and PR… Tero Kivinen
- Re: [IPsec] #121: Rekeying IKE SAs: KEr errors an… Scott C Moonen
- Re: [IPsec] #121: Rekeying IKE SAs: KEr errors an… Tero Kivinen
- Re: [IPsec] #121: Rekeying IKE SAs: KEr errors an… Paul Hoffman
- Re: [IPsec] #121: Rekeying IKE SAs: KEr errors an… Scott C Moonen
- Re: [IPsec] #121: Rekeying IKE SAs: KEr errors an… Tero Kivinen