diff options
Diffstat (limited to 'doc/standards')
-rw-r--r-- | doc/standards/draft-eronen-ipsec-ikev2-clarifications-09.txt | 3250 | ||||
-rw-r--r-- | doc/standards/draft-eronen-ipsec-ikev2-eap-auth-05.txt | 729 | ||||
-rw-r--r-- | doc/standards/draft-hoffman-ikev2-1-00.txt | 6720 | ||||
-rw-r--r-- | doc/standards/draft-hoffman-ikev2bis-00.txt | 6776 | ||||
-rw-r--r-- | doc/standards/draft-myers-ikev2-ocsp-03.txt | 785 | ||||
-rw-r--r-- | doc/standards/rfc3748.txt | 3755 | ||||
-rw-r--r-- | doc/standards/rfc4186.txt | 5155 | ||||
-rw-r--r-- | doc/standards/rfc4301.txt | 5659 | ||||
-rw-r--r-- | doc/standards/rfc4306.txt | 5547 | ||||
-rw-r--r-- | doc/standards/rfc4307.txt | 339 | ||||
-rw-r--r-- | doc/standards/rfc4478.txt | 283 | ||||
-rw-r--r-- | doc/standards/rfc4718.txt | 3251 | ||||
-rw-r--r-- | doc/standards/rfc4739.txt | 619 |
13 files changed, 42868 insertions, 0 deletions
diff --git a/doc/standards/draft-eronen-ipsec-ikev2-clarifications-09.txt b/doc/standards/draft-eronen-ipsec-ikev2-clarifications-09.txt new file mode 100644 index 000000000..00f50dc31 --- /dev/null +++ b/doc/standards/draft-eronen-ipsec-ikev2-clarifications-09.txt @@ -0,0 +1,3250 @@ + + + + +Network Working Group P. Eronen +Internet-Draft Nokia +Intended status: Informational P. Hoffman +Expires: November 5, 2006 VPN Consortium + May 4, 2006 + + + IKEv2 Clarifications and Implementation Guidelines + draft-eronen-ipsec-ikev2-clarifications-09.txt + +Status of this Memo + + By submitting this Internet-Draft, each author represents that any + applicable patent or other IPR claims of which he or she is aware + have been or will be disclosed, and any of which he or she becomes + aware will be disclosed, in accordance with Section 6 of BCP 79. + + Internet-Drafts are working documents of the Internet Engineering + Task Force (IETF), its areas, and its working groups. Note that + other groups may also distribute working documents as Internet- + Drafts. + + Internet-Drafts are draft documents valid for a maximum of six months + and may be updated, replaced, or obsoleted by other documents at any + time. It is inappropriate to use Internet-Drafts as reference + material or to cite them other than as "work in progress." + + The list of current Internet-Drafts can be accessed at + http://www.ietf.org/ietf/1id-abstracts.txt. + + The list of Internet-Draft Shadow Directories can be accessed at + http://www.ietf.org/shadow.html. + + This Internet-Draft will expire on November 5, 2006. + +Copyright Notice + + Copyright (C) The Internet Society (2006). + +Abstract + + This document clarifies many areas of the IKEv2 specification. It + does not to introduce any changes to the protocol, but rather + provides descriptions that are less prone to ambiguous + interpretations. The purpose of this document is to encourage the + development of interoperable implementations. + + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 1] + +Internet-Draft IKEv2 Clarifications May 2006 + + +Table of Contents + + 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4 + 2. Creating the IKE_SA . . . . . . . . . . . . . . . . . . . . . 4 + 2.1. SPI values in IKE_SA_INIT exchange . . . . . . . . . . . . 4 + 2.2. Message IDs for IKE_SA_INIT messages . . . . . . . . . . . 5 + 2.3. Retransmissions of IKE_SA_INIT requests . . . . . . . . . 5 + 2.4. Interaction of COOKIE and INVALID_KE_PAYLOAD . . . . . . . 6 + 2.5. Invalid cookies . . . . . . . . . . . . . . . . . . . . . 8 + 3. Authentication . . . . . . . . . . . . . . . . . . . . . . . . 8 + 3.1. Data included in AUTH payload calculation . . . . . . . . 8 + 3.2. Hash function for RSA signatures . . . . . . . . . . . . . 9 + 3.3. Encoding method for RSA signatures . . . . . . . . . . . . 10 + 3.4. Identification type for EAP . . . . . . . . . . . . . . . 10 + 3.5. Identity for policy lookups when using EAP . . . . . . . . 11 + 3.6. Certificate encoding types . . . . . . . . . . . . . . . . 11 + 3.7. Shared key authentication and fixed PRF key size . . . . . 12 + 3.8. EAP authentication and fixed PRF key size . . . . . . . . 13 + 3.9. Matching ID payloads to certificate contents . . . . . . . 13 + 3.10. Message IDs for IKE_AUTH messages . . . . . . . . . . . . 13 + 4. Creating CHILD_SAs . . . . . . . . . . . . . . . . . . . . . . 13 + 4.1. Creating SAs with the CREATE_CHILD_SA exchange . . . . . . 13 + 4.2. Creating an IKE_SA without a CHILD_SA . . . . . . . . . . 16 + 4.3. Diffie-Hellman for first CHILD_SA . . . . . . . . . . . . 16 + 4.4. Extended Sequence Numbers (ESN) transform . . . . . . . . 16 + 4.5. Negotiation of ESP_TFC_PADDING_NOT_SUPPORTED . . . . . . . 17 + 4.6. Negotiation of NON_FIRST_FRAGMENTS_ALSO . . . . . . . . . 17 + 4.7. Semantics of complex traffic selector payloads . . . . . . 18 + 4.8. ICMP type/code in traffic selector payloads . . . . . . . 18 + 4.9. Mobility header in traffic selector payloads . . . . . . . 19 + 4.10. Narrowing the traffic selectors . . . . . . . . . . . . . 20 + 4.11. SINGLE_PAIR_REQUIRED . . . . . . . . . . . . . . . . . . . 20 + 4.12. Traffic selectors violating own policy . . . . . . . . . . 21 + 4.13. Traffic selector authorization . . . . . . . . . . . . . . 21 + 5. Rekeying and deleting SAs . . . . . . . . . . . . . . . . . . 22 + 5.1. Rekeying SAs with the CREATE_CHILD_SA exchange . . . . . . 23 + 5.2. Rekeying the IKE_SA vs. reauthentication . . . . . . . . . 24 + 5.3. SPIs when rekeying the IKE_SA . . . . . . . . . . . . . . 25 + 5.4. SPI when rekeying a CHILD_SA . . . . . . . . . . . . . . . 25 + 5.5. Changing PRFs when rekeying the IKE_SA . . . . . . . . . . 25 + 5.6. Deleting vs. closing SAs . . . . . . . . . . . . . . . . . 25 + 5.7. Deleting a CHILD_SA pair . . . . . . . . . . . . . . . . . 26 + 5.8. Deleting an IKE_SA . . . . . . . . . . . . . . . . . . . . 26 + 5.9. Who is the original initiator of IKE_SA . . . . . . . . . 26 + 5.10. Comparing nonces . . . . . . . . . . . . . . . . . . . . . 27 + 5.11. Exchange collisions . . . . . . . . . . . . . . . . . . . 27 + 5.12. Diffie-Hellman and rekeying the IKE_SA . . . . . . . . . . 36 + 6. Configuration payloads . . . . . . . . . . . . . . . . . . . . 36 + + + +Eronen & Hoffman Expires November 5, 2006 [Page 2] + +Internet-Draft IKEv2 Clarifications May 2006 + + + 6.1. Assigning IP addresses . . . . . . . . . . . . . . . . . . 36 + 6.2. Requesting any INTERNAL_IP4/IP6_ADDRESS . . . . . . . . . 37 + 6.3. INTERNAL_IP4_SUBNET/INTERNAL_IP6_SUBNET . . . . . . . . . 38 + 6.4. INTERNAL_IP4_NETMASK . . . . . . . . . . . . . . . . . . . 40 + 6.5. Configuration payloads for IPv6 . . . . . . . . . . . . . 41 + 6.6. INTERNAL_IP6_NBNS . . . . . . . . . . . . . . . . . . . . 43 + 6.7. INTERNAL_ADDRESS_EXPIRY . . . . . . . . . . . . . . . . . 43 + 6.8. Address assignment failures . . . . . . . . . . . . . . . 43 + 7. Miscellaneous issues . . . . . . . . . . . . . . . . . . . . . 44 + 7.1. Matching ID_IPV4_ADDR and ID_IPV6_ADDR . . . . . . . . . . 44 + 7.2. Relationship of IKEv2 to RFC4301 . . . . . . . . . . . . . 44 + 7.3. Reducing the window size . . . . . . . . . . . . . . . . . 45 + 7.4. Minimum size of nonces . . . . . . . . . . . . . . . . . . 45 + 7.5. Initial zero octets on port 4500 . . . . . . . . . . . . . 45 + 7.6. Destination port for NAT traversal . . . . . . . . . . . . 46 + 7.7. SPI values for messages outside of an IKE_SA . . . . . . . 46 + 7.8. Protocol ID/SPI fields in Notify payloads . . . . . . . . 47 + 7.9. Which message should contain INITIAL_CONTACT . . . . . . . 47 + 7.10. Alignment of payloads . . . . . . . . . . . . . . . . . . 47 + 7.11. Key length transform attribute . . . . . . . . . . . . . . 48 + 7.12. IPsec IANA considerations . . . . . . . . . . . . . . . . 48 + 7.13. Combining ESP and AH . . . . . . . . . . . . . . . . . . . 49 + 8. Implementation mistakes . . . . . . . . . . . . . . . . . . . 49 + 9. Security considerations . . . . . . . . . . . . . . . . . . . 50 + 10. IANA considerations . . . . . . . . . . . . . . . . . . . . . 50 + 11. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 50 + 12. References . . . . . . . . . . . . . . . . . . . . . . . . . . 50 + 12.1. Normative References . . . . . . . . . . . . . . . . . . . 50 + 12.2. Informative References . . . . . . . . . . . . . . . . . . 51 + Appendix A. Exchanges and payloads . . . . . . . . . . . . . . . 53 + A.1. IKE_SA_INIT exchange . . . . . . . . . . . . . . . . . . . 53 + A.2. IKE_AUTH exchange without EAP . . . . . . . . . . . . . . 54 + A.3. IKE_AUTH exchange with EAP . . . . . . . . . . . . . . . . 55 + A.4. CREATE_CHILD_SA exchange for creating/rekeying + CHILD_SAs . . . . . . . . . . . . . . . . . . . . . . . . 56 + A.5. CREATE_CHILD_SA exchange for rekeying the IKE_SA . . . . . 56 + A.6. INFORMATIONAL exchange . . . . . . . . . . . . . . . . . . 56 + Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 56 + Intellectual Property and Copyright Statements . . . . . . . . . . 58 + + + + + + + + + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 3] + +Internet-Draft IKEv2 Clarifications May 2006 + + +1. Introduction + + This document clarifies many areas of the IKEv2 specification that + may be difficult to understand to developers not intimately familiar + with the specification and its history. The clarifications in this + document come from the discussion on the IPsec WG mailing list, from + experience in interoperability testing, and from implementation + issues that have been brought to the editors' attention. + + IKEv2/IPsec can be used for several different purposes, including + IPsec-based remote access (sometimes called the "road warrior" case), + site-to-site virtual private networks (VPNs), and host-to-host + protection of application traffic. While this document attempts to + consider all of these uses, the remote access scenario has perhaps + received more attention here than the other uses. + + This document does not place any requirements on anyone, and does not + use [RFC2119] keywords such as "MUST" and "SHOULD", except in + quotations from the original IKEv2 documents. The requirements are + given in the IKEv2 specification [IKEv2] and IKEv2 cryptographic + algorithms document [IKEv2ALG]. + + In this document, references to a numbered section (such as "Section + 2.15") mean that section in [IKEv2]. References to mailing list + messages or threads refer to the IPsec WG mailing list at + ipsec@ietf.org. Archives of the mailing list can be found at + <http://www.ietf.org/mail-archive/web/ipsec/index.html>. + + +2. Creating the IKE_SA + +2.1. SPI values in IKE_SA_INIT exchange + + Normal IKE messages include the initiator's and responder's SPIs, + both of which are non-zero, in the IKE header. However, there are + some corner cases where the IKEv2 specification is not fully + consistent about what values should be used. + + First, Section 3.1 says that the Responder's SPI "...MUST NOT be zero + in any other message" (than the first message of the IKE_SA_INIT + exchange). However, the figure in Section 2.6 shows the second + IKE_SA_INIT message as "HDR(A,0), N(COOKIE)", contradicting the text + in 3.1. + + Since the responder's SPI identifies security-related state held by + the responder, and in this case no state is created, sending a zero + value seems reasonable. + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 4] + +Internet-Draft IKEv2 Clarifications May 2006 + + + Second, in addition to cookies, there are several other cases when + the IKE_SA_INIT exchange does not result in the creation of an IKE_SA + (for instance, INVALID_KE_PAYLOAD or NO_PROPOSAL_CHOSEN). What + responder SPI value should be used in the IKE_SA_INIT response in + this case? + + Since the IKE_SA_INIT request always has a zero responder SPI, the + value will not be actually used by the initiator. Thus, we think + sending a zero value is correct also in this case. + + If the responder sends a non-zero responder SPI, the initiator should + not reject the response only for that reason. However, when retrying + the IKE_SA_INIT request, the initiator will use a zero responder SPI, + as described in Section 3.1: "Responder's SPI [...] This value MUST + be zero in the first message of an IKE Initial Exchange (including + repeats of that message including a cookie) [...]". We believe the + intent was to cover repeats of that message due to other reasons, + such as INVALID_KE_PAYLOAD, as well. + + (References: "INVALID_KE_PAYLOAD and clarifications document" thread, + Sep-Oct 2005.) + +2.2. Message IDs for IKE_SA_INIT messages + + The Message ID for IKE_SA_INIT messages is always zero. This + includes retries of the message due to responses such as COOKIE and + INVALID_KE_PAYLOAD. + + This is because Message IDs are part of the IKE_SA state, and when + the responder replies to IKE_SA_INIT request with N(COOKIE) or + N(INVALID_KE_PAYLOAD), the responder does not allocate any state. + + (References: "Question about N(COOKIE) and N(INVALID_KE_PAYLOAD) + combination" thread, Oct 2004. Tero Kivinen's mail "Comments of + draft-eronen-ipsec-ikev2-clarifications-02.txt", 2005-04-05.) + +2.3. Retransmissions of IKE_SA_INIT requests + + When a responder receives an IKE_SA_INIT request, it has to determine + whether the packet is a retransmission belonging to an existing + "half-open" IKE_SA (in which case the responder retransmits the same + response), or a new request (in which case the responder creates a + new IKE_SA and sends a fresh response). + + The specification does not describe in detail how this determination + is done. In particular, it is not sufficient to use the initiator's + SPI and/or IP address for this purpose: two different peers behind a + single NAT could choose the same initiator SPI (and the probability + + + +Eronen & Hoffman Expires November 5, 2006 [Page 5] + +Internet-Draft IKEv2 Clarifications May 2006 + + + of this happening is not necessarily small, since IKEv2 does not + require SPIs to be chosen randomly). Instead, the responder should + do the IKE_SA lookup using the whole packet or its hash (or at the + minimum, the Ni payload which is always chosen randomly). + + For all other packets than IKE_SA_INIT requests, looking up right + IKE_SA is of course done based on the recipient's SPI (either the + initiator or responder SPI depending on the value of the Initiator + bit in the IKE header). + +2.4. Interaction of COOKIE and INVALID_KE_PAYLOAD + + There are two common reasons why the initiator may have to retry the + IKE_SA_INIT exchange: the responder requests a cookie or wants a + different Diffie-Hellman group than was included in the KEi payload. + Both of these cases are quite simple alone, but it is not totally + obvious what happens when they occur at the same time, that is, the + IKE_SA_INIT exchange is retried several times. + + The main question seems to be the following: if the initiator + receives a cookie from the responder, should it include the cookie in + only the next retry of the IKE_SA_INIT request, or in all subsequent + retries as well? Section 3.10.1 says that: + + "This notification MUST be included in an IKE_SA_INIT request + retry if a COOKIE notification was included in the initial + response." + + This could be interpreted as saying that when a cookie is received in + the initial response, it is included in all retries. On the other + hand, Section 2.6 says that: + + "Initiators who receive such responses MUST retry the + IKE_SA_INIT with a Notify payload of type COOKIE containing + the responder supplied cookie data as the first payload and + all other payloads unchanged." + + Including the same cookie in later retries makes sense only if the + "all other payloads unchanged" restriction applies only to the first + retry, but not to subsequent retries. + + It seems that both interpretations can peacefully co-exist. If the + initiator includes the cookie only in the next retry, one additional + roundtrip may be needed in some cases: + + + + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 6] + +Internet-Draft IKEv2 Clarifications May 2006 + + + Initiator Responder + ----------- ----------- + HDR(A,0), SAi1, KEi, Ni --> + <-- HDR(A,0), N(COOKIE) + HDR(A,0), N(COOKIE), SAi1, KEi, Ni --> + <-- HDR(A,0), N(INVALID_KE_PAYLOAD) + HDR(A,0), SAi1, KEi', Ni --> + <-- HDR(A,0), N(COOKIE') + HDR(A,0), N(COOKIE'), SAi1, KEi',Ni --> + <-- HDR(A,B), SAr1, KEr, Nr + + An additional roundtrip is needed also if the initiator includes the + cookie in all retries, but the responder does not support this + functionality. For instance, if the responder includes the SAi1 and + KEi payloads in cookie calculation, it will reject the request by + sending a new cookie (see also Section 2.5 of this document for more + text about invalid cookies): + + Initiator Responder + ----------- ----------- + HDR(A,0), SAi1, KEi, Ni --> + <-- HDR(A,0), N(COOKIE) + HDR(A,0), N(COOKIE), SAi1, KEi, Ni --> + <-- HDR(A,0), N(INVALID_KE_PAYLOAD) + HDR(A,0), N(COOKIE), SAi1, KEi', Ni --> + <-- HDR(A,0), N(COOKIE') + HDR(A,0), N(COOKIE'), SAi1, KEi',Ni --> + <-- HDR(A,B), SAr1, KEr, Nr + + If both peers support including the cookie in all retries, a slightly + shorter exchange can happen: + + Initiator Responder + ----------- ----------- + HDR(A,0), SAi1, KEi, Ni --> + <-- HDR(A,0), N(COOKIE) + HDR(A,0), N(COOKIE), SAi1, KEi, Ni --> + <-- HDR(A,0), N(INVALID_KE_PAYLOAD) + HDR(A,0), N(COOKIE), SAi1, KEi', Ni --> + <-- HDR(A,B), SAr1, KEr, Nr + + This document recommends that implementations should support this + shorter exchange, but it must not be assumed the other peer also + supports the shorter exchange. + + + + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 7] + +Internet-Draft IKEv2 Clarifications May 2006 + + + In theory, even this exchange has one unnecessary roundtrip, as both + the cookie and Diffie-Hellman group could be checked at the same + time: + + Initiator Responder + ----------- ----------- + HDR(A,0), SAi1, KEi, Ni --> + <-- HDR(A,0), N(COOKIE), + N(INVALID_KE_PAYLOAD) + HDR(A,0), N(COOKIE), SAi1, KEi',Ni --> + <-- HDR(A,B), SAr1, KEr, Nr + + However, it is clear that this case is not allowed by the text in + Section 2.6, since "all other payloads" clearly includes the KEi + payload as well. + + (References: "INVALID_KE_PAYLOAD and clarifications document" thread, + Sep-Oct 2005.) + +2.5. Invalid cookies + + There has been some confusion what should be done when an IKE_SA_INIT + request containing an invalid cookie is received ("invalid" in the + sense that its contents do not match the value expected by the + responder). + + The correct action is to ignore the cookie, and process the message + as if no cookie had been included (usually this means sending a + response containing a new cookie). This is shown in Section 2.6 when + it says "The responder in that case MAY reject the message by sending + another response with a new cookie [...]". + + Other possible actions, such as ignoring the whole request (or even + all requests from this IP address for some time), create strange + failure modes even in the absence of any malicious attackers, and do + not provide any additional protection against DoS attacks. + + (References: "Invalid Cookie" thread, Sep-Oct 2005.) + + +3. Authentication + +3.1. Data included in AUTH payload calculation + + Section 2.15 describes how the AUTH payloads are calculated; this + calculation involves values prf(SK_pi,IDi') and prf(SK_pr,IDr'). The + text describes the method in words, but does not give clear + definitions of what is signed or MACed. + + + +Eronen & Hoffman Expires November 5, 2006 [Page 8] + +Internet-Draft IKEv2 Clarifications May 2006 + + + The initiator's signed octets can be described as: + + InitiatorSignedOctets = RealMessage1 | NonceRData | MACedIDForI + GenIKEHDR = [ four octets 0 if using port 4500 ] | RealIKEHDR + RealIKEHDR = SPIi | SPIr | . . . | Length + RealMessage1 = RealIKEHDR | RestOfMessage1 + NonceRPayload = PayloadHeader | NonceRData + InitiatorIDPayload = PayloadHeader | RestOfIDPayload + RestOfInitIDPayload = IDType | RESERVED | InitIDData + MACedIDForI = prf(SK_pi, RestOfInitIDPayload) + + The responder's signed octets can be described as: + + ResponderSignedOctets = RealMessage2 | NonceIData | MACedIDForR + GenIKEHDR = [ four octets 0 if using port 4500 ] | RealIKEHDR + RealIKEHDR = SPIi | SPIr | . . . | Length + RealMessage2 = RealIKEHDR | RestOfMessage2 + NonceIPayload = PayloadHeader | NonceIData + ResponderIDPayload = PayloadHeader | RestOfIDPayload + RestOfRespIDPayload = IDType | RESERVED | InitIDData + MACedIDForR = prf(SK_pr, RestOfRespIDPayload) + +3.2. Hash function for RSA signatures + + Section 3.8 says that RSA digital signature is "Computed as specified + in section 2.15 using an RSA private key over a PKCS#1 padded hash." + + Unlike IKEv1, IKEv2 does not negotiate a hash function for the + IKE_SA. The algorithm for signatures is selected by the signing + party who, in general, may not know beforehand what algorithms the + verifying party supports. Furthermore, [IKEv2ALG] does not say what + algorithms implementations are required or recommended to support. + This clearly has a potential for causing interoperability problems, + since authentication will fail if the signing party selects an + algorithm that is not supported by the verifying party, or not + acceptable according to the verifying party's policy. + + This document recommends that all implementations support SHA-1, and + use SHA-1 as the default hash function when generating the + signatures, unless there are good reasons (such as explicit manual + configuration) to believe that the peer supports something else. + + Note that hash function collision attacks are not important for the + AUTH payloads, since they are not intended for third-party + verification, and the data includes fresh nonces. See [HashUse] for + more discussion about hash function attacks and IPsec. + + Another reasonable choice would be to use the hash function that was + + + +Eronen & Hoffman Expires November 5, 2006 [Page 9] + +Internet-Draft IKEv2 Clarifications May 2006 + + + used by the CA when signing the peer certificate. However, this does + not guarantee that the IKEv2 peer would be able to validate the AUTH + payload, because the same code might not be used to validate + certificate signatures and IKEv2 message signatures, and these two + routines may support a different set of hash algorithms. The peer + could be configured with a fingerprint of the certificate, or + certificate validation could be performed by an external entity using + [SCVP]. Furthermore, not all CERT payloads types include a + signature, and the certificate could be signed with some algorithm + other than RSA. + + Note that unlike IKEv1, IKEv2 uses the PKCS#1 v1.5 [PKCS1v20] + signature encoding method (see next section for details), which + includes the algorithm identifier for the hash algorithm. Thus, when + the verifying party receives the AUTH payload it can at least + determine which hash function was used. + + (References: Magnus Nystrom's mail "RE:", 2005-01-03. Pasi Eronen's + reply, 2005-01-04. Tero Kivinen's reply, 2005-01-04. "First draft + of IKEv2.1" thread, Dec 2005/Jan 2006.) + +3.3. Encoding method for RSA signatures + + Section 3.8 says that the RSA digital signature is "Computed as + specified in section 2.15 using an RSA private key over a PKCS#1 + padded hash." + + The PKCS#1 specification [PKCS1v21] defines two different encoding + methods (ways of "padding the hash") for signatures. However, the + Internet-Draft approved by the IESG had a reference to the older + PKCS#1 v2.0 [PKCS1v20]. That version has only one encoding method + for signatures (EMSA-PKCS1-v1_5), and thus there is no ambiguity. + + Note that this encoding method is different from the encoding method + used in IKEv1. If future revisions of IKEv2 provide support for + other encoding methods (such as EMSA-PSS), they will be given new + Auth Method numbers. + + (References: Pasi Eronen's mail "RE:", 2005-01-04.) + +3.4. Identification type for EAP + + Section 3.5 defines several different types for identification + payloads, including, e.g., ID_FQDN, ID_RFC822_ADDR, and ID_KEY_ID. + EAP [EAP] does not mandate the use of any particular type of + identifier, but often EAP is used with Network Access Identifiers + (NAIs) defined in [NAI]. Although NAIs look a bit like email + addresses (e.g., "joe@example.com"), the syntax is not exactly the + + + +Eronen & Hoffman Expires November 5, 2006 [Page 10] + +Internet-Draft IKEv2 Clarifications May 2006 + + + same as the syntax of email address in [RFC822]. This raises the + question of which identification type should be used. + + This document recommends that ID_RFC822_ADDR identification type is + used for those NAIs that include the realm component. Therefore, + responder implementations should not attempt to verify that the + contents actually conform to the exact syntax given in [RFC822] or + [RFC2822], but instead should accept any reasonable looking NAI. + + For NAIs that do not include the realm component, this document + recommends using the ID_KEY_ID identification type. + + (References: "need your help on this IKEv2/i18n/EAP issue" and "IKEv2 + identifier issue with EAP" threads, Aug 2004.) + +3.5. Identity for policy lookups when using EAP + + When the initiator authentication uses EAP, it is possible that the + contents of the IDi payload is used only for AAA routing purposes and + selecting which EAP method to use. This value may be different from + the identity authenticated by the EAP method (see [EAP], Sections 5.1 + and 7.3). + + It is important that policy lookups and access control decisions use + the actual authenticated identity. Often the EAP server is + implemented in a separate AAA server that communicates with the IKEv2 + responder using, e.g., RADIUS [RADEAP]. In this case, the + authenticated identity has to be sent from the AAA server to the + IKEv2 responder. + + (References: Pasi Eronen's mail "RE: Reauthentication in IKEv2", + 2004-10-28. "Policy lookups" thread, Oct/Nov 2004. RFC 3748, + Section 7.3.) + +3.6. Certificate encoding types + + Section 3.6 defines a total of twelve different certificate encoding + types, and continues that "Specific syntax is for some of the + certificate type codes above is not defined in this document." + However, the text does not provide references to other documents that + would contain information about the exact contents and use of those + values. + + + + + + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 11] + +Internet-Draft IKEv2 Clarifications May 2006 + + + Without this information, it is not possible to develop interoperable + implementations. Therefore, this document recommends that the + following certificate encoding values should not be used before new + specifications that specify their use are available. + + PKCS #7 wrapped X.509 certificate 1 + PGP Certificate 2 + DNS Signed Key 3 + Kerberos Token 6 + SPKI Certificate 9 + + This document recommends that most implementations should use only + those values that are "MUST"/"SHOULD" requirements in [IKEv2]; i.e., + "X.509 Certificate - Signature" (4), "Raw RSA Key" (11), "Hash and + URL of X.509 certificate" (12), and "Hash and URL of X.509 bundle" + (13). + + Furthermore, Section 3.7 says that the "Certificate Encoding" field + for the Certificate Request payload uses the same values as for + Certificate payload. However, the contents of the "Certification + Authority" field are defined only for X.509 certificates (presumably + covering at least types 4, 10, 12, and 13). This document recommends + that other values should not be used before new specifications that + specify their use are available. + + The "Raw RSA Key" type needs one additional clarification. Section + 3.6 says it contains "a PKCS #1 encoded RSA key". What this means is + a DER-encoded RSAPublicKey structure from PKCS#1 [PKCS1v21]. + +3.7. Shared key authentication and fixed PRF key size + + Section 2.15 says that "If the negotiated prf takes a fixed-size key, + the shared secret MUST be of that fixed size". This statement is + correct: the shared secret must be of the correct size. If it is + not, it cannot be used; there is no padding, truncation, or other + processing involved to force it to that correct size. + + This requirement means that it is difficult to use these PRFs with + shared key authentication. The authors think this part of the + specification was very poorly thought out, and using PRFs with a + fixed key size is likely to result in interoperability problems. + Thus, we recommend that such PRFs should not be used with shared key + authentication. PRF_AES128_XCBC [RFC3664] originally used fixed key + sizes; that RFC has been updated to handle variable key sizes in + [RFC3664bis]. + + Note that Section 2.13 also contains text that is related to PRFs + with fixed key size: "When the key for the prf function has fixed + + + +Eronen & Hoffman Expires November 5, 2006 [Page 12] + +Internet-Draft IKEv2 Clarifications May 2006 + + + length, the data provided as a key is truncated or padded with zeros + as necessary unless exceptional processing is explained following the + formula". However, this text applies only to the prf+ construction, + so it does not contradict the text in Section 2.15. + + (References: Paul Hoffman's mail "Re: ikev2-07: last nits", + 2003-05-02. Hugo Krawczyk's reply, 2003-05-12. Thread "Question + about PRFs with fixed size key", Jan 2005.) + +3.8. EAP authentication and fixed PRF key size + + As described in the previous section, PRFs with a fixed key size + require a shared secret of exactly that size. This restriction + applies also to EAP authentication. For instance, a PRF that + requires a 128-bit key cannot be used with EAP since [EAP] specifies + that the MSK is at least 512 bits long. + + (References: Thread "Question about PRFs with fixed size key", Jan + 2005.) + +3.9. Matching ID payloads to certificate contents + + In IKEv1, there was some confusion about whether or not the + identities in certificates used to authenticate IKE were required to + match the contents of the ID payloads. The PKI4IPsec Working Group + produced the document [PKI4IPsec] which covers this topic in much + more detail. However, Section 3.5 of [IKEv2] explicitly says that + the ID payload "does not necessarily have to match anything in the + CERT payload". + +3.10. Message IDs for IKE_AUTH messages + + According to Section 2.2, "The IKE_SA initial setup messages will + always be numbered 0 and 1." That is true when the IKE_AUTH exchange + does not use EAP. When EAP is used, each pair of messages has their + message numbers incremented. The first pair of AUTH messages will + have an ID of 1, the second will be 2, and so on. + + (References: "Question about MsgID in AUTH exchange" thread, April + 2005.) + + +4. Creating CHILD_SAs + +4.1. Creating SAs with the CREATE_CHILD_SA exchange + + Section 1.3's organization does not lead to clear understanding of + what is needed in which environment. The section can be reorganized + + + +Eronen & Hoffman Expires November 5, 2006 [Page 13] + +Internet-Draft IKEv2 Clarifications May 2006 + + + with subsections for each use of the CREATE_CHILD_SA exchange + (creating child SAs, rekeying IKE SAs, and rekeying child SAs.) + + The new Section 1.3 with subsections and the above changes might look + like the following. + + NEW-1.3 The CREATE_CHILD_SA Exchange + + The CREATE_CHILD_SA Exchange is used to create new CHILD_SAs and + to rekey both IKE_SAs and CHILD_SAs. This exchange consists of + a single request/response pair, and some of its function was + referred to as a phase 2 exchange in IKEv1. It MAY be initiated + by either end of the IKE_SA after the initial exchanges are + completed. + + All messages following the initial exchange are + cryptographically protected using the cryptographic algorithms + and keys negotiated in the first two messages of the IKE + exchange. These subsequent messages use the syntax of the + Encrypted Payload described in section 3.14. All subsequent + messages include an Encrypted Payload, even if they are referred + to in the text as "empty". + + The CREATE_CHILD_SA is used for rekeying IKE_SAs and CHILD_SAs. + This section describes the first part of rekeying, the creation + of new SAs; Section 2.8 covers the mechanics of rekeying, + including moving traffic from old to new SAs and the deletion of + the old SAs. The two sections must be read together to + understand the entire process of rekeying. + + Either endpoint may initiate a CREATE_CHILD_SA exchange, so in + this section the term initiator refers to the endpoint + initiating this exchange. An implementation MAY refuse all + CREATE_CHILD_SA requests within an IKE_SA. + + The CREATE_CHILD_SA request MAY optionally contain a KE payload + for an additional Diffie-Hellman exchange to enable stronger + guarantees of forward secrecy for the CHILD_SA or IKE_SA. The + keying material for the SA is a function of SK_d established + during the establishment of the IKE_SA, the nonces exchanged + during the CREATE_CHILD_SA exchange, and the Diffie-Hellman + value (if KE payloads are included in the CREATE_CHILD_SA + exchange). The details are described in sections 2.17 and 2.18. + + If a CREATE_CHILD_SA exchange includes a KEi payload, at least + one of the SA offers MUST include the Diffie-Hellman group of + the KEi. The Diffie-Hellman group of the KEi MUST be an element + of the group the initiator expects the responder to accept + + + +Eronen & Hoffman Expires November 5, 2006 [Page 14] + +Internet-Draft IKEv2 Clarifications May 2006 + + + (additional Diffie-Hellman groups can be proposed). If the + responder rejects the Diffie-Hellman group of the KEi payload, + the responder MUST reject the request and indicate its preferred + Diffie-Hellman group in the INVALID_KE_PAYLOAD Notification + payload. In the case of such a rejection, the CREATE_CHILD_SA + exchange fails, and the initiator SHOULD retry the exchange with + a Diffie-Hellman proposal and KEi in the group that the + responder gave in the INVALID_KE_PAYLOAD. + + NEW-1.3.1 Creating New CHILD_SAs with the CREATE_CHILD_SA Exchange + + A CHILD_SA may be created by sending a CREATE_CHILD_SA request. + The CREATE_CHILD_SA request for creating a new CHILD_SA is: + + Initiator Responder + ----------- ----------- + HDR, SK {[N+], SA, Ni, [KEi], + TSi, TSr} --> + + The initiator sends SA offer(s) in the SA payload, a nonce in + the Ni payload, optionally a Diffie-Hellman value in the KEi + payload, and the proposed traffic selectors for the proposed + CHILD_SA in the TSi and TSr payloads. The request can also + contain Notify payloads that specify additional details for the + CHILD_SA: these include IPCOMP_SUPPORTED, USE_TRANSPORT_MODE, + ESP_TFC_PADDING_NOT_SUPPORTED, and NON_FIRST_FRAGMENTS_ALSO. + + The CREATE_CHILD_SA response for creating a new CHILD_SA is: + + <-- HDR, SK {[N+], SA, Nr, + [KEr], TSi, TSr} + + The responder replies with the accepted offer in an SA payload, + and a Diffie-Hellman value in the KEr payload if KEi was + included in the request and the selected cryptographic suite + includes that group. As with the request, optional Notification + payloads can specify additional details for the CHILD_SA. + + The traffic selectors for traffic to be sent on that SA are + specified in the TS payloads in the response, which may be a + subset of what the initiator of the CHILD_SA proposed. + + The text about rekeying SAs can be found in Section 5.1 of this + document. + + + + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 15] + +Internet-Draft IKEv2 Clarifications May 2006 + + +4.2. Creating an IKE_SA without a CHILD_SA + + CHILD_SAs can be created either by being piggybacked on the IKE_AUTH + exchange, or using a separate CREATE_CHILD_SA exchange. The + specification is not clear about what happens if creating the + CHILD_SA during the IKE_AUTH exchange fails for some reason. + + Our recommendation in this sitation is that the IKE_SA is created as + usual. This is also in line with how the CREATE_CHILD_SA exchange + works: a failure to create a CHILD_SA does not close the IKE_SA. + + The list of responses in the IKE_AUTH exchange that do not prevent an + IKE_SA from being set up include at least the following: + NO_PROPOSAL_CHOSEN, TS_UNACCEPTABLE, SINGLE_PAIR_REQUIRED, + INTERNAL_ADDRESS_FAILURE, and FAILED_CP_REQUIRED. + + (References: "Questions about internal address" thread, April, 2005.) + +4.3. Diffie-Hellman for first CHILD_SA + + Section 1.2 shows that IKE_AUTH messages do not contain KEi/KEr or + Ni/Nr payloads. This implies that the SA payload in IKE_AUTH + exchange cannot contain Transform Type 4 (Diffie-Hellman Group) with + any other value than NONE. Implementations should probably leave the + transform out entirely in this case. + +4.4. Extended Sequence Numbers (ESN) transform + + The description of the ESN transform in Section 3.3 has be proved + difficult to understand. The ESN transform has the following + meaning: + + o A proposal containing one ESN transform with value 0 means "do not + use extended sequence numbers". + + o A proposal containing one ESN transform with value 1 means "use + extended sequence numbers". + + o A proposal containing two ESN transforms with values 0 and 1 means + "I support both normal and extended sequence numbers, you choose". + (Obviously this case is only allowed in requests; the response + will contain only one ESN transform.) + + In most cases, the exchange initiator will include either the first + or third alternative in its SA payload. The second alternative is + rarely useful for the initiator: it means that using normal sequence + numbers is not acceptable (so if the responder does not support ESNs, + the exchange will fail with NO_PROPOSAL_CHOSEN). + + + +Eronen & Hoffman Expires November 5, 2006 [Page 16] + +Internet-Draft IKEv2 Clarifications May 2006 + + + Note that including the ESN transform is mandatory when creating + ESP/AH SAs (it was optional in earlier drafts of the IKEv2 + specification). + + (References: "Technical change needed to IKEv2 before publication", + "STRAW POLL: Dealing with the ESN negotiation interop issue in IKEv2" + and "Results of straw poll regarding: IKEv2 interoperability issue" + threads, March-April 2005.) + +4.5. Negotiation of ESP_TFC_PADDING_NOT_SUPPORTED + + The description of ESP_TFC_PADDING_NOT_SUPPORTED notification in + Section 3.10.1 says that "This notification asserts that the sending + endpoint will NOT accept packets that contain Flow Confidentiality + (TFC) padding". + + However, the text does not say in which messages this notification + should be included, or whether the scope of this notification is a + single CHILD_SA or all CHILD_SAs of the peer. + + Our interpretation is that the scope is a single CHILD_SA, and thus + this notification is included in messages containing an SA payload + negotiating a CHILD_SA. If neither endpoint accepts TFC padding, + this notification will be included in both the request proposing an + SA and the response accepting it. If this notification is included + in only one of the messages, TFC padding can still be sent in one + direction. + +4.6. Negotiation of NON_FIRST_FRAGMENTS_ALSO + + NON_FIRST_FRAGMENTS_ALSO notification is described in Section 3.10.1 + simply as "Used for fragmentation control. See [RFC4301] for + explanation." + + [RFC4301] says "Implementations that will transmit non-initial + fragments on a tunnel mode SA that makes use of non-trivial port (or + ICMP type/code or MH type) selectors MUST notify a peer via the IKE + NOTIFY NON_FIRST_FRAGMENTS_ALSO payload. The peer MUST reject this + proposal if it will not accept non-initial fragments in this context. + If an implementation does not successfully negotiate transmission of + non-initial fragments for such an SA, it MUST NOT send such fragments + over the SA." + + However, it is not clear exactly how the negotiation works. Our + interpretation is that the negotiation works the same way as for + IPCOMP_SUPPORTED and USE_TRANSPORT_MODE: sending non-first fragments + is enabled only if NON_FIRST_FRAGMENTS_ALSO notification is included + in both the request proposing an SA and the response accepting it. + + + +Eronen & Hoffman Expires November 5, 2006 [Page 17] + +Internet-Draft IKEv2 Clarifications May 2006 + + + In other words, if the peer "rejects this proposal", it only omits + NON_FIRST_FRAGMENTS_ALSO notification from the response, but does not + reject the whole CHILD_SA creation. + +4.7. Semantics of complex traffic selector payloads + + As described in Section 3.13, the TSi/TSr payloads can include one or + more individual traffic selectors. + + There is no requirement that TSi and TSr contain the same number of + individual traffic selectors. Thus, they are interpreted as follows: + a packet matches a given TSi/TSr if it matches at least one of the + individual selectors in TSi, and at least one of the individual + selectors in TSr. + + For instance, the following traffic selectors: + + TSi = ((17, 100, 192.0.1.66-192.0.1.66), + (17, 200, 192.0.1.66-192.0.1.66)) + TSr = ((17, 300, 0.0.0.0-255.255.255.255), + (17, 400, 0.0.0.0-255.255.255.255)) + + would match UDP packets from 192.0.1.66 to anywhere, with any of the + four combinations of source/destination ports (100,300), (100,400), + (200,300), and (200, 400). + + This implies that some types of policies may require several CHILD_SA + pairs. For instance, a policy matching only source/destination ports + (100,300) and (200,400), but not the other two combinations, cannot + be negotiated as a single CHILD_SA pair using IKEv2. + + (References: "IKEv2 Traffic Selectors?" thread, Feb 2005.) + +4.8. ICMP type/code in traffic selector payloads + + The traffic selector types 7 and 8 can also refer to ICMP type and + code fields. As described in Section 3.13.1, "For the ICMP protocol, + the two one-octet fields Type and Code are treated as a single 16-bit + integer (with Type in the most significant eight bits and Code in the + least significant eight bits) port number for the purposes of + filtering based on this field." + + Since ICMP packets do not have separate source and destination port + fields, there is some room for confusion what exactly the four TS + payloads (two in the request, two in the response, each containing + both start and end port fields) should contain. + + The answer to this question can be found from [RFC4301] Section + + + +Eronen & Hoffman Expires November 5, 2006 [Page 18] + +Internet-Draft IKEv2 Clarifications May 2006 + + + 4.4.1.3. + + To give a concrete example, if a host at 192.0.1.234 wants to create + a transport mode SA for sending "Destination Unreachable" packets + (ICMPv4 type 3) to 192.0.2.155, but is not willing to receive them + over this SA pair, the CREATE_CHILD_SA exchange would look like this: + + Initiator Responder + ----------- ----------- + HDR, SK { N(USE_TRANSPORT_MODE), SA, Ni, + TSi(1, 0x0300-0x03FF, 192.0.1.234-192.0.1.234), + TSr(1, 65535-0, 192.0.2.155-192.0.2.155) } --> + + <-- HDR, SK { N(USE_TRANSPORT_MODE), SA, Nr, + TSi(1, 0x0300-0x03FF, 192.0.1.234-192.0.1.234), + TSr(1, 65535-0, 192.0.2.155-192.0.2.155) } + + Since IKEv2 always creates IPsec SAs in pairs, two SAs are also + created in this case, even though the second SA is never used for + data traffic. + + An exchange creating an SA pair that can be used both for sending and + receiving "Destination Unreachable" places the same value in all the + port: + + Initiator Responder + ----------- ----------- + HDR, SK { N(USE_TRANSPORT_MODE), SA, Ni, + TSi(1, 0x0300-0x03FF, 192.0.1.234-192.0.1.234), + TSr(1, 0x0300-0x03FF, 192.0.2.155-192.0.2.155) } --> + + <-- HDR, SK { N(USE_TRANSPORT_MODE), SA, Nr, + TSi(1, 0x0300-0x03FF, 192.0.1.234-192.0.1.234), + TSr(1, 0x0300-0x03FF, 192.0.2.155-192.0.2.155) } + + (References: "ICMP and MH TSs for IKEv2" thread, Sep 2005.) + +4.9. Mobility header in traffic selector payloads + + Traffic selectors can use IP Protocol ID 135 to match the IPv6 + mobility header [MIPv6]. However, the IKEv2 specification does not + define how to represent the "MH Type" field in traffic selectors. + + At some point, it was expected that this will be defined in a + separate document later. However, [RFC4301] says that "For IKE, the + IPv6 mobility header message type (MH type) is placed in the most + significant eight bits of the 16 bit local "port" selector". The + direction semantics of TSi/TSr port fields are the same as for ICMP, + + + +Eronen & Hoffman Expires November 5, 2006 [Page 19] + +Internet-Draft IKEv2 Clarifications May 2006 + + + and are described in the previous section. + + (References: Tero Kivinen's mail "Issue #86: Add IPv6 mobility header + message type as selector", 2003-10-14. "ICMP and MH TSs for IKEv2" + thread, Sep 2005.) + +4.10. Narrowing the traffic selectors + + Section 2.9 describes how traffic selectors are negotiated when + creating a CHILD_SA. A more concise summary of the narrowing process + is presented below. + + o If the responder's policy does not allow any part of the traffic + covered by TSi/TSr, it responds with TS_UNACCEPTABLE. + + o If the responder's policy allows the entire set of traffic covered + by TSi/TSr, no narrowing is necessary, and the responder can + return the same TSi/TSr values. + + o Otherwise, narrowing is needed. If the responder's policy allows + all traffic covered by TSi[1]/TSr[1] (the first traffic selectors + in TSi/TSr) but not entire TSi/TSr, the responder narrows to an + acceptable subset of TSi/TSr that includes TSi[1]/TSr[1]. + + o If the responder's policy does not allow all traffic covered by + TSi[1]/TSr[1], but does allow some parts of TSi/TSr, it narrows to + an acceptable subset of TSi/TSr. + + In the last two cases, there may be several subsets that are + acceptable (but their union is not); in this case, the responder + arbitrarily chooses one of them, and includes ADDITIONAL_TS_POSSIBLE + notification in the response. + +4.11. SINGLE_PAIR_REQUIRED + + The description of the SINGLE_PAIR_REQUIRED notify payload in + Sections 2.9 and 3.10.1 is not fully consistent. + + We do not attempt to describe this payload in this document either, + since it is expected that most implementations will not have policies + that require separate SAs for each address pair. + + Thus, if only some part (or parts) of the TSi/TSr proposed by the + initiator is (are) acceptable to the responder, most responders + should simply narrow TSi/TSr to an acceptable subset (as described in + the last two paragraphs of Section 2.9), rather than use + SINGLE_PAIR_REQUIRED. + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 20] + +Internet-Draft IKEv2 Clarifications May 2006 + + +4.12. Traffic selectors violating own policy + + Section 2.9 describes traffic selector negotiation in great detail. + One aspect of this negotiation that may need some clarification is + that when creating a new SA, the initiator should not propose traffic + selectors that violate its own policy. If this rule is not followed, + valid traffic may be dropped. + + This is best illustrated by an example. Suppose that host A has a + policy whose effect is that traffic to 192.0.1.66 is sent via host B + encrypted using AES, and traffic to all other hosts in 192.0.1.0/24 + is also sent via B, but encrypted using 3DES. Suppose also that host + B accepts any combination of AES and 3DES. + + If host A now proposes an SA that uses 3DES, and includes TSr + containing (192.0.1.0-192.0.1.0.255), this will be accepted by host + B. Now, host B can also use this SA to send traffic from 192.0.1.66, + but those packets will be dropped by A since it requires the use of + AES for those traffic. Even if host A creates a new SA only for + 192.0.1.66 that uses AES, host B may freely continue to use the first + SA for the traffic. In this situation, when proposing the SA, host A + should have followed its own policy, and included a TSr containing + ((192.0.1.0-192.0.1.65),(192.0.1.67-192.0.1.255)) instead. + + In general, if (1) the initiator makes a proposal "for traffic X + (TSi/TSr), do SA", and (2) for some subset X' of X, the initiator + does not actually accept traffic X' with SA, and (3) the initiator + would be willing to accept traffic X' with some SA' (!=SA), valid + traffic can be unnecessarily dropped since the responder can apply + either SA or SA' to traffic X'. + + (References: "Question about "narrowing" ..." thread, Feb 2005. + "IKEv2 needs a "policy usage mode"..." thread, Feb 2005. "IKEv2 + Traffic Selectors?" thread, Feb 2005. "IKEv2 traffic selector + negotiation examples", 2004-08-08.) + +4.13. Traffic selector authorization + + IKEv2 relies on information in the Peer Authorization Database (PAD) + when determining what kind of IPsec SAs a peer is allowed to create. + This process is described in [RFC4301] Section 4.4.3. When a peer + requests the creation of an IPsec SA with some traffic selectors, the + PAD must contain "Child SA Authorization Data" linking the identity + authenticated by IKEv2 and the addresses permitted for traffic + selectors. + + For example, the PAD might be configured so that authenticated + identity "sgw23.example.com" is allowed to create IPsec SAs for + + + +Eronen & Hoffman Expires November 5, 2006 [Page 21] + +Internet-Draft IKEv2 Clarifications May 2006 + + + 192.0.2.0/24, meaning this security gateway is a valid + "representative" for these addresses. Host-to-host IPsec requires + similar entries, linking, for example, "fooserver4.example.com" with + 192.0.1.66/32, meaning this identity a valid "owner" or + "representative" of the address in question. + + As noted in [RFC4301], "It is necessary to impose these constraints + on creation of child SAs to prevent an authenticated peer from + spoofing IDs associated with other, legitimate peers." In the + example given above, a correct configuration of the PAD prevents + sgw23 from creating IPsec SAs with address 192.0.1.66, and prevents + fooserver4 from creating IPsec SAs with addresses from 192.0.2.0/24. + + It is important to note that simply sending IKEv2 packets using some + particular address does not imply a permission to create IPsec SAs + with that address in the traffic selectors. For example, even if + sgw23 would be able to spoof its IP address as 192.0.1.66, it could + not create IPsec SAs matching fooserver4's traffic. + + The IKEv2 specification does not specify how exactly IP address + assignment using configuration payloads interacts with the PAD. Our + interpretation is that when a security gateway assigns an address + using configuration payloads, it also creates a temporary PAD entry + linking the authenticated peer identity and the newly allocated inner + address. + + It has been recognized that configuring the PAD correctly may be + difficult in some environments. For instance, if IPsec is used + between a pair of hosts whose addresses are allocated dynamically + using DHCP, it is extremely difficult to ensure that the PAD + specifies the correct "owner" for each IP address. This would + require a mechanism to securely convey address assignments from the + DHCP server, and link them to identities authenticated using IKEv2. + + Due to this limitation, some vendors have been known to configure + their PADs to allow an authenticated peer to create IPsec SAs with + traffic selectors containing the same address that was used for the + IKEv2 packets. In environments where IP spoofing is possible (i.e., + almost everywhere) this essentially allows any peer to create IPsec + SAs with any traffic selectors. This is not an appropriate or secure + configuration in most circumstances. See [Aura05] for an extensive + discussion about this issue, and the limitations of host-to-host + IPsec in general. + + +5. Rekeying and deleting SAs + + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 22] + +Internet-Draft IKEv2 Clarifications May 2006 + + +5.1. Rekeying SAs with the CREATE_CHILD_SA exchange + + Continued from Section 4.1 of this document. + + NEW-1.3.2 Rekeying IKE_SAs with the CREATE_CHILD_SA Exchange + + The CREATE_CHILD_SA request for rekeying an IKE_SA is: + + Initiator Responder + ----------- ----------- + HDR, SK {SA, Ni, [KEi]} --> + + The initiator sends SA offer(s) in the SA payload, a nonce in + the Ni payload, and optionally a Diffie-Hellman value in the KEi + payload. + + The CREATE_CHILD_SA response for rekeying an IKE_SA is: + + <-- HDR, SK {SA, Nr, [KEr]} + + The responder replies (using the same Message ID to respond) + with the accepted offer in an SA payload, a nonce in the Nr + payload, and, optionally, a Diffie-Hellman value in the KEr + payload. + + The new IKE_SA has its message counters set to 0, regardless of + what they were in the earlier IKE_SA. The window size starts at + 1 for any new IKE_SA. The new initiator and responder SPIs are + supplied in the SPI fields of the SA payloads. + + NEW-1.3.3 Rekeying CHILD_SAs with the CREATE_CHILD_SA Exchange + + The CREATE_CHILD_SA request for rekeying a CHILD_SA is: + + Initiator Responder + ----------- ----------- + HDR, SK {N(REKEY_SA), [N+], SA, + Ni, [KEi], TSi, TSr} --> + + The leading Notify payload of type REKEY_SA identifies the + CHILD_SA being rekeyed, and contains the SPI that the initiator + expects in the headers of inbound packets. In addition, the + initiator sends SA offer(s) in the SA payload, a nonce in the Ni + payload, optionally a Diffie-Hellman value in the KEi payload, + and the proposed traffic selectors in the TSi and TSr payloads. + The request can also contain Notify payloads that specify + additional details for the CHILD_SA. + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 23] + +Internet-Draft IKEv2 Clarifications May 2006 + + + The CREATE_CHILD_SA response for rekeying a CHILD_SA is: + + <-- HDR, SK {[N+], SA, Nr, + [KEr], TSi, TSr} + + The responder replies with the accepted offer in an SA payload, + and a Diffie-Hellman value in the KEr payload if KEi was + included in the request and the selected cryptographic suite + includes that group. + + The traffic selectors for traffic to be sent on that SA are + specified in the TS payloads in the response, which may be a + subset of what the initiator of the CHILD_SA proposed. + +5.2. Rekeying the IKE_SA vs. reauthentication + + Rekeying the IKE_SA and reauthentication are different concepts in + IKEv2. Rekeying the IKE_SA establishes new keys for the IKE_SA and + resets the Message ID counters, but it does not authenticate the + parties again (no AUTH or EAP payloads are involved). + + While rekeying the IKE_SA may be important in some environments, + reauthentication (the verification that the parties still have access + to the long-term credentials) is often more important. + + IKEv2 does not have any special support for reauthentication. + Reauthentication is done by creating a new IKE_SA from scratch (using + IKE_SA_INIT/IKE_AUTH exchanges, without any REKEY_SA notify + payloads), creating new CHILD_SAs within the new IKE_SA (without + REKEY_SA notify payloads), and finally deleting the old IKE_SA (which + deletes the old CHILD_SAs as well). + + This means that reauthentication also establishes new keys for the + IKE_SA and CHILD_SAs. Therefore, while rekeying can be performed + more often than reauthentication, the situation where "authentication + lifetime" is shorter than "key lifetime" does not make sense. + + While creation of a new IKE_SA can be initiated by either party + (initiator or responder in the original IKE_SA), the use of EAP + authentication and/or configuration payloads means in practice that + reauthentication has to be initiated by the same party as the + original IKE_SA. IKEv2 does not currently allow the responder to + request reauthentication in this case; however, there is ongoing work + to add this functionality [ReAuth]. + + (References: "Reauthentication in IKEv2" thread, Oct/Nov 2004.) + + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 24] + +Internet-Draft IKEv2 Clarifications May 2006 + + +5.3. SPIs when rekeying the IKE_SA + + Section 2.18 says that "New initiator and responder SPIs are supplied + in the SPI fields". This refers to the SPI fields in the Proposal + structures inside the Security Association (SA) payloads, not the SPI + fields in the IKE header. + + (References: Tom Stiemerling's mail "Rekey IKE SA", 2005-01-24. + Geoffrey Huang's reply, 2005-01-24.) + +5.4. SPI when rekeying a CHILD_SA + + Section 3.10.1 says that in REKEY_SA notifications, "The SPI field + identifies the SA being rekeyed." + + Since CHILD_SAs always exist in pairs, there are two different SPIs. + The SPI placed in the REKEY_SA notification is the SPI the exchange + initiator would expect in inbound ESP or AH packets (just as in + Delete payloads). + +5.5. Changing PRFs when rekeying the IKE_SA + + When rekeying the IKE_SA, Section 2.18 says that "SKEYSEED for the + new IKE_SA is computed using SK_d from the existing IKE_SA as + follows: + + SKEYSEED = prf(SK_d (old), [g^ir (new)] | Ni | Nr)" + + If the old and new IKE_SA selected a different PRF, it is not totally + clear which PRF should be used. + + Since the rekeying exchange belongs to the old IKE_SA, it is the old + IKE_SA's PRF that is used. This also follows the principle that the + same key (the old SK_d) should not be used with multiple + cryptographic algorithms. + + Note that this may work poorly if the new IKE_SA's PRF has a fixed + key size, since the output of the PRF may not be of the correct size. + This supports our opinion earlier in the document that the use of + PRFs with a fixed key size is a bad idea. + + (References: "Changing PRFs when rekeying the IKE_SA" thread, June + 2005.) + +5.6. Deleting vs. closing SAs + + The IKEv2 specification talks about "closing" and "deleting" SAs, but + it is not always clear what exactly is meant. However, other parts + + + +Eronen & Hoffman Expires November 5, 2006 [Page 25] + +Internet-Draft IKEv2 Clarifications May 2006 + + + of the specification make it clear that when local state related to a + CHILD_SA is removed, the SA must also be actively deleted with a + Delete payload. + + In particular, Section 2.4 says that "If an IKE endpoint chooses to + delete CHILD_SAs, it MUST send Delete payloads to the other end + notifying it of the deletion". Section 1.4 also explains that "ESP + and AH SAs always exist in pairs, with one SA in each direction. + When an SA is closed, both members of the pair MUST be closed." + +5.7. Deleting a CHILD_SA pair + + Section 1.4 describes how to delete SA pairs using the Informational + exchange: "To delete an SA, an INFORMATIONAL exchange with one or + more delete payloads is sent listing the SPIs (as they would be + expected in the headers of inbound packets) of the SAs to be deleted. + The recipient MUST close the designated SAs." + + The "one or more delete payloads" phrase has caused some confusion. + You never send delete payloads for the two sides of an SA in a single + message. If you have many SAs to delete at the same time (such as + the nested example given in that paragraph), you include delete + payloads for in inbound half of each SA in your Informational + exchange. + +5.8. Deleting an IKE_SA + + Since IKE_SAs do not exist in pairs, it is not totally clear what the + response message should contain when the request deleted the IKE_SA. + + Since there is no information that needs to be sent to the other side + (except that the request was received), an empty Informational + response seems like the most logical choice. + + (References: "Question about delete IKE SA" thread, May 2005.) + +5.9. Who is the original initiator of IKE_SA + + In the IKEv2 document, "initiator" refers to the party who initiated + the exchange being described, and "original initiator" refers to the + party who initiated the whole IKE_SA. However, there is some + potential for confusion because the IKE_SA can be rekeyed by either + party. + + To clear up this confusion, we propose that "original initiator" + always refers to the party who initiated the exchange which resulted + in the current IKE_SA. In other words, if the "original responder" + starts rekeying the IKE_SA, that party becomes the "original + + + +Eronen & Hoffman Expires November 5, 2006 [Page 26] + +Internet-Draft IKEv2 Clarifications May 2006 + + + initiator" of the new IKE_SA. + + (References: Paul Hoffman's mail "Original initiator in IKEv2", 2005- + 04-21.) + +5.10. Comparing nonces + + Section 2.8 about rekeying says that "If redundant SAs are created + though such a collision, the SA created with the lowest of the four + nonces used in the two exchanges SHOULD be closed by the endpoint + that created it." + + Here "lowest" uses an octet-by-octet (lexicographical) comparison + (instead of, for instance, comparing the nonces as large integers). + In other words, start by comparing the first octet; if they're equal, + move to the next octet, and so on. If you reach the end of one + nonce, that nonce is the lower one. + + (References: "IKEv2 rekeying question" thread, July 2005.) + +5.11. Exchange collisions + + Since IKEv2 exchanges can be initiated by both peers, it is possible + that two exchanges affecting the same SA partly overlap. This can + lead to a situation where the SA state information is temporarily not + synchronized, and a peer can receive a request it cannot process in a + normal fashion. Some of these corner cases are discussed in the + specification, some are not. + + Obviously, using a window size greater than one leads to infinitely + more complex situations, especially if requests are processed out of + order. In this section, we concentrate on problems that can arise + even with window size 1. + + (References: "IKEv2: invalid SPI in DELETE payload" thread, Dec 2005/ + Jan 2006. "Problem with exchanges collisions" thread, Dec 2005.) + +5.11.1. Simultaneous CHILD_SA close + + Probably the simplest case happens if both peers decide to close the + same CHILD_SA pair at the same time: + + + + + + + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 27] + +Internet-Draft IKEv2 Clarifications May 2006 + + + Host A Host B + -------- -------- + send req1: D(SPIa) --> + <-- send req2: D(SPIb) + --> recv req1 + <-- send resp1: () + recv resp1 + recv req2 + send resp2: () --> + --> recv resp2 + + This case is described in Section 1.4, and is handled by omitting the + Delete payloads from the response messages. + +5.11.2. Simultaneous IKE_SA close + + Both peers can also decide to close the IKE_SA at the same time. The + desired end result is obvious; however, in certain cases the final + exchanges may not be fully completed. + + Host A Host B + -------- -------- + send req1: D() --> + <-- send req2: D() + --> recv req1 + + At this point, host B should reply as usual (with empty Informational + response), close the IKE_SA, and stop retransmitting req2. This is + because once host A receives resp1, it may not be able to reply any + longer. The situation is symmetric, so host A should behave the same + way. + + Host A Host B + -------- -------- + <-- send resp1: () + send resp2: () + + Even if neither resp1 nor resp2 ever arrives, the end result is still + correct: the IKE_SA is gone. The same happens if host A never + receives req2. + +5.11.3. Simultaneous CHILD_SA rekeying + + Another case that is described in the specification is simultaneous + rekeying. Section 2.8 says + + + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 28] + +Internet-Draft IKEv2 Clarifications May 2006 + + + "If the two ends have the same lifetime policies, it is possible + that both will initiate a rekeying at the same time (which will + result in redundant SAs). To reduce the probability of this + happening, the timing of rekeying requests SHOULD be jittered + (delayed by a random amount of time after the need for rekeying is + noticed). + + This form of rekeying may temporarily result in multiple similar + SAs between the same pairs of nodes. When there are two SAs + eligible to receive packets, a node MUST accept incoming packets + through either SA. If redundant SAs are created though such a + collision, the SA created with the lowest of the four nonces used + in the two exchanges SHOULD be closed by the endpoint that created + it." + + However, a better explanation on what impact this has on + implementations is needed. Assume that hosts A and B have an + existing IPsec SA pair with SPIs (SPIa1,SPIb1), and both start + rekeying it at the same time: + + Host A Host B + -------- -------- + send req1: N(REKEY_SA,SPIa1), + SA(..,SPIa2,..),Ni1,.. --> + <-- send req2: N(REKEY_SA,SPIb1), + SA(..,SPIb2,..),Ni2,.. + recv req2 <-- + + At this point, A knows there is a simultaneous rekeying going on. + However, it cannot yet know which of the exchanges will have the + lowest nonce, so it will just note the situation and respond as + usual. + + send resp2: SA(..,SPIa3,..),Nr1,.. --> + --> recv req1 + + Now B also knows that simultaneous rekeying is going on. Similarly + as host A, it has to respond as usual. + + <-- send resp1: SA(..,SPIb3,..),Nr2,.. + recv resp1 <-- + --> recv resp2 + + At this point, there are three CHILD_SA pairs between A and B (the + old one and two new ones). A and B can now compare the nonces. + Suppose that the lowest nonce was Nr1 in message resp2; in this case, + B (the sender of req2) deletes the redundant new SA, and A (the node + that initiated the surviving rekeyed SA), deletes the old one. + + + +Eronen & Hoffman Expires November 5, 2006 [Page 29] + +Internet-Draft IKEv2 Clarifications May 2006 + + + send req3: D(SPIa1) --> + <-- send req4: D(SPIb2) + --> recv req3 + <-- send resp4: D(SPIb1) + recv req4 <-- + send resp4: D(SPIa3) --> + + The rekeying is now finished. + + However, there is a second possible sequence of events that can + happen if some packets are lost in the network, resulting in + retransmissions. The rekeying begins as usual, but A's first packet + (req1) is lost. + + Host A Host B + -------- -------- + send req1: N(REKEY_SA,SPIa1), + SA(..,SPIa2,..),Ni1,.. --> (lost) + <-- send req2: N(REKEY_SA,SPIb1), + SA(..,SPIb2,..),Ni2,.. + recv req2 <-- + send resp2: SA(..,SPIa3,..),Nr1,.. --> + --> recv resp2 + <-- send req3: D(SPIb1) + recv req3 <-- + send resp3: D(SPIa1) --> + --> recv resp3 + + From B's point of view, the rekeying is now completed, and since it + has not yet received A's req1, it does not even know that these was + simultaneous rekeying. However, A will continue retransmitting the + message, and eventually it will reach B. + + resend req1 --> + --> recv req1 + + What should B do in this point? To B, it looks like A is trying to + rekey an SA that no longer exists; thus failing the request with + something non-fatal such as NO_PROPOSAL_CHOSEN seems like a + reasonable approach. + + <-- send resp1: N(NO_PROPOSAL_CHOSEN) + recv resp1 <-- + + When A receives this error, it already knows there was simultaneous + rekeying, so it can ignore the error message. + + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 30] + +Internet-Draft IKEv2 Clarifications May 2006 + + +5.11.4. Simultaneous IKE_SA rekeying + + Probably the most complex case occurs when both peers try to rekey + the IKE_SA at the same time. Basically, the text in Section 2.8 + applies to this case as well; however, it is important to ensure that + the CHILD_SAs are inherited by the right IKE_SA. + + The case where both endpoints notice the simultaneous rekeying works + the same way as with CHILD_SAs. After the CREATE_CHILD_SA exchanges, + three IKE_SAs exist between A and B; the one containing the lowest + nonce inherits the CHILD_SAs. + + However, there is a twist to the other case where one rekeying + finishes first: + + Host A Host B + -------- -------- + send req1: + SA(..,SPIa1,..),Ni1,.. --> + <-- send req2: SA(..,SPIb1,..),Ni2,.. + --> recv req1 + <-- send resp1: SA(..,SPIb2,..),Nr2,.. + recv resp1 <-- + send req3: D() --> + --> recv req3 + + At this point, host B sees a request to close the IKE_SA. There's + not much more to do than to reply as usual. However, at this point + host B should stop retransmitting req2, since once host A receives + resp3, it will delete all the state associated with the old IKE_SA, + and will not be able to reply to it. + + <-- send resp3: () + +5.11.5. Closing and rekeying a CHILD_SA + + A case similar to simultaneous rekeying can occur if one peer decides + to close an SA and the other peer tries to rekey it: + + Host A Host B + -------- -------- + send req1: D(SPIa) --> + <-- send req2: N(REKEY_SA,SPIb),SA,.. + --> recv req1 + + At this point, host B notices that host A is trying to close an SA + that host B is currently rekeying. Replying as usual is probably the + best choice: + + + +Eronen & Hoffman Expires November 5, 2006 [Page 31] + +Internet-Draft IKEv2 Clarifications May 2006 + + + <-- send resp1: D(SPIb) + + Depending on in which order req2 and resp1 arrive, host A sees either + a request to rekey an SA that it is currently closing, or a request + to rekey an SA that does not exist. In both cases, + NO_PROPOSAL_CHOSEN is probably fine. + + recv req2 + recv resp1 + send resp2: N(NO_PROPOSAL_CHOSEN) --> + --> recv resp2 + +5.11.6. Closing a new CHILD_SA + + Yet another case occurs when host A creates a CHILD_SA pair, but soon + thereafter host B decides to delete it (possible because its policy + changed): + + Host A Host B + -------- -------- + send req1: [N(REKEY_SA,SPIa1)], + SA(..,SPIa2,..),.. --> + --> recv req1 + (lost) <-- send resp1: SA(..,SPIb2,..),.. + + <-- send req2: D(SPIb2) + recv req2 + + At this point, host A has not yet received message resp1 (and is + retransmitting message req1), so it does not recognize SPIb in + message req2. What should host A do? + + One option would be to reply with an empty Informational response. + However, this same reply would also be sent if host A has received + resp1, but has already sent a new request to delete the SA that was + just created. This would lead to a situation where the peers are no + longer in sync about which SAs exist between them. However, host B + would eventually notice that the other half of the CHILD_SA pair has + not been deleted. Section 1.4 describes this case and notes that "a + node SHOULD regard half-closed connections as anomalous and audit + their existence should they persist", and continues that "if + connection state becomes sufficiently messed up, a node MAY close the + IKE_SA". + + Another solution that has been proposed is to reply with an + INVALID_SPI notification which contains SPIb. This would explicitly + tell host B that the SA was not deleted, so host B could try deleting + it again later. However, this usage is not part of the IKEv2 + + + +Eronen & Hoffman Expires November 5, 2006 [Page 32] + +Internet-Draft IKEv2 Clarifications May 2006 + + + specification, and would not be in line with normal use of the + INVALID_SPI notification where the data field contains the SPI the + recipient of the notification would put in outbound packets. + + Yet another solution would be to ignore req2 at this time, and wait + until we have received resp1. However, this alternative has not been + fully analyzed at this time; in general, ignoring valid requests is + always a bit dangerous, because both endpoints could do it, leading + to a deadlock. + + This document recommends the first alternative. + +5.11.7. Rekeying a new CHILD_SA + + Yet another case occurs when a CHILD_SA is rekeyed soon after it has + been created: + + Host A Host B + -------- -------- + send req1: [N(REKEY_SA,SPIa1)], + SA(..,SPIa2,..),.. --> + (lost) <-- send resp1: SA(..,SPIb2,..),.. + + <-- send req2: N(REKEY_SA,SPIb2), + SA(..,SPIb3,..),.. + recv req2 <-- + + To host A, this looks like a request to rekey an SA that does not + exist. Like in the simultaneous rekeying case, replying with + NO_PROPOSAL_CHOSEN is probably reasonable: + + send resp2: N(NO_PROPOSAL_CHOSEN) --> + recv resp1 + +5.11.8. Collisions with IKE_SA rekeying + + Another set of cases occur when one peer starts rekeying the IKE_SA + at the same time the other peer starts creating, rekeying, or closing + a CHILD_SA. Suppose that host B starts creating a CHILD_SA, and soon + after, host A starts rekeying the IKE_SA: + + Host A Host B + -------- -------- + <-- send req1: SA,Ni1,TSi,TSr + send req2: SA,Ni2,.. --> + --> recv req2 + + What should host B do at this point? Replying as usual would seem + + + +Eronen & Hoffman Expires November 5, 2006 [Page 33] + +Internet-Draft IKEv2 Clarifications May 2006 + + + like a reasonable choice: + + <-- send resp2: SA,Ni2,.. + recv resp2 <-- + send req3: D() --> + --> recv req3 + + Now, a problem arises: If host B now replies normally with an empty + Informational response, this will cause host A to delete state + associated with the IKE_SA. This means host B should stop + retransmitting req1. However, host B cannot know whether or not host + A has received req1. If host A did receive it, it will move the + CHILD_SA to the new IKE_SA as usual, and the state information will + then be out of sync. + + It seems this situation is tricky to handle correctly. Our proposal + is as follows: if a host receives a request to rekey the IKE_SA when + it has CHILD_SAs in "half-open" state (currently being created or + rekeyed), it should reply with NO_PROPOSAL_CHOSEN. If a host + receives a request to create or rekey a CHILD_SA after it has started + rekeying the IKE_SA, it should reply with NO_ADDITIONAL_SAS. + + The case where CHILD_SAs are being closed is even worse. Our + recommendation is that if a host receives a request to rekey the + IKE_SA when it has CHILD_SAs in "half-closed" state (currently being + closed), it should reply with NO_PROPOSAL_CHOSEN. And if a host + receives a request to close a CHILD_SA after it has started rekeying + the IKE_SA, it should reply with an empty Informational response. + This ensures that at least the other peer will eventually notice that + the CHILD_SA is still in "half-closed" state, and will start a new + IKE_SA from scratch. + +5.11.9. Closing and rekeying the IKE_SA + + The final case considered in this section occurs if one peer decides + to close the IKE_SA while the other peer tries to rekey it. + + Host A Host B + -------- -------- + send req1: SA(..,SPIa1,..),Ni1 --> + <-- send req2: D() + --> recv req1 + recv req2 <-- + + At this point, host B should probably reply with NO_PROPOSAL_CHOSEN, + and host A should reply as usual, close the IKE_SA, and stop + retransmitting req1. + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 34] + +Internet-Draft IKEv2 Clarifications May 2006 + + + <-- send resp1: N(NO_PROPOSAL_CHOSEN) + send resp2: () + + If host A wants to continue communication with B, it can now start a + new IKE_SA. + +5.11.10. Summary + + If a host receives a request to rekey: + + o a CHILD_SA pair that the host is currently trying to close: reply + with NO_PROPOSAL_CHOSEN. + + o a CHILD_SA pair that the host is currently rekeying: reply as + usual, but prepare to close redundant SAs later based on the + nonces. + + o a CHILD_SA pair that does not exist: reply with + NO_PROPOSAL_CHOSEN. + + o the IKE_SA, and the host is currently rekeying the IKE_SA: reply + as usual, but prepare to close redundant SAs and move inherited + CHILD_SAs later based on the nonces. + + o the IKE_SA, and the host is currently creating, rekeying, or + closing a CHILD_SA: reply with NO_PROPOSAL_CHOSEN. + + o the IKE_SA, and the host is currently trying to close the IKE_SA: + reply with NO_PROPOSAL_CHOSEN. + + If a host receives a request to close: + + o a CHILD_SA pair that the host is currently trying to close: reply + without Delete payloads. + + o a CHILD_SA pair that the host is currently rekeying: reply as + usual, with Delete payload. + + o a CHILD_SA pair that does not exist: reply without Delete + payloads. + + o the IKE_SA, and the host is currently rekeying the IKE_SA: reply + as usual, and forget about our own rekeying request. + + o the IKE_SA, and the host is currently trying to close the IKE_SA: + reply as usual, and forget about our own close request. + + If a host receives a request to create or rekey a CHILD_SA when it is + + + +Eronen & Hoffman Expires November 5, 2006 [Page 35] + +Internet-Draft IKEv2 Clarifications May 2006 + + + currently rekeying the IKE_SA: reply with NO_ADDITIONAL_SAS. + + If a host receives a request to delete a CHILD_SA when it is + currently rekeying the IKE_SA: reply without Delete payloads. + +5.12. Diffie-Hellman and rekeying the IKE_SA + + There has been some confusion whether doing a new Diffie-Hellman + exchange is mandatory when the IKE_SA is rekeyed. + + It seems that this case is allowed by the IKEv2 specification. + Section 2.18 shows the Diffie-Hellman term (g^ir) in brackets. + Section 3.3.3 does not contradict this when it says that including + the D-H transform is mandatory: although including the transform is + mandatory, it can contain the value "NONE". + + However, having the option to skip the Diffie-Hellman exchange when + rekeying the IKE_SA does not add useful functionality to the + protocol. The main purpose of rekeying the IKE_SA is to ensure that + the compromise of old keying material does not provide information + about the current keys, or vice versa. This requires performing the + Diffie-Hellman exchange when rekeying. Furthermore, it is likely + that this option would have been removed from the protocol as + unnecessary complexity had it been discussed earlier. + + Given this, we recommend that implementations should have a hard- + coded policy that requires performing a new Diffie-Hellman exchange + when rekeying the IKE_SA. In other words, the initiator should not + propose the value "NONE" for the D-H transform, and the responder + should not accept such a proposal. This policy also implies that a + succesful exchange rekeying the IKE_SA always includes the KEi/KEr + payloads. + + (References: "Rekeying IKE_SAs with the CREATE_CHILD_SA exhange" + thread, Oct 2005. "Comments of + draft-eronen-ipsec-ikev2-clarifications-02.txt" thread, Apr 2005.) + + +6. Configuration payloads + +6.1. Assigning IP addresses + + Section 2.9 talks about traffic selector negotiation and mentions + that "In support of the scenario described in section 1.1.3, an + initiator may request that the responder assign an IP address and + tell the initiator what it is." + + This sentence is correct, but its placement is slightly confusing. + + + +Eronen & Hoffman Expires November 5, 2006 [Page 36] + +Internet-Draft IKEv2 Clarifications May 2006 + + + IKEv2 does allow the initiator to request assignment of an IP address + from the responder, but this is done using configuration payloads, + not traffic selector payloads. An address in a TSi payload in a + response does not mean that the responder has assigned that address + to the initiator; it only means that if packets matching these + traffic selectors are sent by the initiator, IPsec processing can be + performed as agreed for this SA. The TSi payload itself does not + give the initiator permission to configure the initiator's TCP/IP + stack with the address and use it as its source address. + + In other words, IKEv2 does not have two different mechanisms for + assigning addresses, but only one: configuration payloads. In the + scenario described in Section 1.1.3, both configuration and traffic + selector payloads are usually included in the same message, and often + contain the same information in the response message (see Section 6.3 + of this document for some examples). However, their semantics are + still different. + +6.2. Requesting any INTERNAL_IP4/IP6_ADDRESS + + When describing the INTERNAL_IP4/IP6_ADDRESS attributes, Section + 3.15.1 says that "In a request message, the address specified is a + requested address (or zero if no specific address is requested)". + The question here is that does "zero" mean an address "0.0.0.0" or a + zero length string? + + Earlier, the same section also says that "If an attribute in the + CFG_REQUEST Configuration Payload is not zero-length, it is taken as + a suggestion for that attribute". Also, the table of configuration + attributes shows that the length of INTERNAL_IP4_ADDRESS is either "0 + or 4 octets", and likewise, INTERNAL_IP6_ADDRESS is either "0 or 17 + octets". + + Thus, if the client does not request a specific address, it includes + a zero-length INTERNAL_IP4/IP6_ADDRESS attribute, not an attribute + containing an all-zeroes address. The example in 2.19 is thus + incorrect, since it shows the attribute as + "INTERNAL_ADDRESS(0.0.0.0)". + + However, since the value is only a suggestion, implementations are + recommended to ignore suggestions they do not accept; or in other + words, treat the same way a zero-length INTERNAL_IP4_ADDRESS, + "0.0.0.0", and any other addresses the implementation does not + recognize as a reasonable suggestion. + + + + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 37] + +Internet-Draft IKEv2 Clarifications May 2006 + + +6.3. INTERNAL_IP4_SUBNET/INTERNAL_IP6_SUBNET + + Section 3.15.1 describes the INTERNAL_IP4_SUBNET as "The protected + sub-networks that this edge-device protects. This attribute is made + up of two fields: the first is an IP address and the second is a + netmask. Multiple sub-networks MAY be requested. The responder MAY + respond with zero or more sub-network attributes." + INTERNAL_IP6_SUBNET is defined in a similar manner. + + This raises two questions: first, since this information is usually + included in the TSr payload, what functionality does this attribute + add? And second, what does this attribute mean in CFG_REQUESTs? + + For the first question, there seem to be two sensible + interpretations. Clearly TSr (in IKE_AUTH or CREATE_CHILD_SA + response) indicates which subnets are accessible through the SA that + was just created. + + The first interpretation of the INTERNAL_IP4/6_SUBNET attributes is + that they indicate additional subnets that can be reached through + this gateway, but need a separate SA. According to this + interpretation, the INTERNAL_IP4/6_SUBNET attributes are useful + mainly when they contain addresses not included in TSr. + + The second interpretation is that the INTERNAL_IP4/6_SUBNET + attributes express the gateway's policy about what traffic should be + sent through the gateway. The client can choose whether other + traffic (covered by TSr, but not in INTERNAL_IP4/6_SUBNET) is sent + through the gateway or directly to the destination. According to + this interpretation, the attributes are useful mainly when TSr + contains addresses not included in the INTERNAL_IP4/6_SUBNET + attributes. + + It turns out that these two interpretations are not incompatible, but + rather two sides of the same principle: traffic to the addresses + listed in the INTERNAL_IP4/6_SUBNET attributes should be sent via + this gateway. If there are no existing IPsec SAs whose traffic + selectors cover the address in question, new SAs have to be created. + + A couple of examples are given below. For instance, if there are two + subnets, 192.0.1.0/26 and 192.0.2.0/24, and the client's request + contains the following: + + CP(CFG_REQUEST) = + INTERNAL_IP4_ADDRESS() + TSi = (0, 0-65535, 0.0.0.0-255.255.255.255) + TSr = (0, 0-65535, 0.0.0.0-255.255.255.255) + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 38] + +Internet-Draft IKEv2 Clarifications May 2006 + + + Then a valid response could be the following (in which TSr and + INTERNAL_IP4_SUBNET contain the same information): + + CP(CFG_REPLY) = + INTERNAL_IP4_ADDRESS(192.0.1.234) + INTERNAL_IP4_SUBNET(192.0.1.0/255.255.255.192) + INTERNAL_IP4_SUBNET(192.0.2.0/255.255.255.0) + TSi = (0, 0-65535, 192.0.1.234-192.0.1.234) + TSr = ((0, 0-65535, 192.0.1.0-192.0.1.63), + (0, 0-65535, 192.0.2.0-192.0.2.255)) + + In these cases, the INTERNAL_IP4_SUBNET does not really carry any + useful information. Another possible reply would have been this: + + CP(CFG_REPLY) = + INTERNAL_IP4_ADDRESS(192.0.1.234) + INTERNAL_IP4_SUBNET(192.0.1.0/255.255.255.192) + INTERNAL_IP4_SUBNET(192.0.2.0/255.255.255.0) + TSi = (0, 0-65535, 192.0.1.234-192.0.1.234) + TSr = (0, 0-65535, 0.0.0.0-255.255.255.255) + + This would mean that the client can send all its traffic through the + gateway, but the gateway does not mind if the client sends traffic + not included by INTERNAL_IP4_SUBNET directly to the destination + (without going through the gateway). + + A different situation arises if the gateway has a policy that + requires the traffic for the two subnets to be carried in separate + SAs. Then a response like this would indicate to the client that if + it wants access to the second subnet, it needs to create a separate + SA: + + CP(CFG_REPLY) = + INTERNAL_IP4_ADDRESS(192.0.1.234) + INTERNAL_IP4_SUBNET(192.0.1.0/255.255.255.192) + INTERNAL_IP4_SUBNET(192.0.2.0/255.255.255.0) + TSi = (0, 0-65535, 192.0.1.234-192.0.1.234) + TSr = (0, 0-65535, 192.0.1.0-192.0.1.63) + + INTERNAL_IP4_SUBNET can also be useful if the client's TSr included + only part of the address space. For instance, if the client requests + the following: + + CP(CFG_REQUEST) = + INTERNAL_IP4_ADDRESS() + TSi = (0, 0-65535, 0.0.0.0-255.255.255.255) + TSr = (0, 0-65535, 192.0.2.155-192.0.2.155) + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 39] + +Internet-Draft IKEv2 Clarifications May 2006 + + + Then the gateway's reply could be this: + + CP(CFG_REPLY) = + INTERNAL_IP4_ADDRESS(192.0.1.234) + INTERNAL_IP4_SUBNET(192.0.1.0/255.255.255.192) + INTERNAL_IP4_SUBNET(192.0.2.0/255.255.255.0) + TSi = (0, 0-65535, 192.0.1.234-192.0.1.234) + TSr = (0, 0-65535, 192.0.2.155-192.0.2.155) + + It is less clear what the attributes mean in CFG_REQUESTs, and + whether other lengths than zero make sense in this situation (but for + INTERNAL_IP6_SUBNET, zero length is not allowed at all!). Currently + this document recommends that implementations should not include + INTERNAL_IP4_SUBNET or INTERNAL_IP6_SUBNET attributes in + CFG_REQUESTs. + + For the IPv4 case, this document recommends using only netmasks + consisting of some amount of "1" bits followed by "0" bits; for + instance, "255.0.255.0" would not be a valid netmask for + INTERNAL_IP4_SUBNET. + + It is also worthwhile to note that the contents of the INTERNAL_IP4/ + 6_SUBNET attributes do not imply link boundaries. For instance, a + gateway providing access to a large company intranet using addresses + from the 10.0.0.0/8 block can send a single INTERNAL_IP4_SUBNET + attribute (10.0.0.0/255.0.0.0) even if the intranet has hundreds of + routers and separate links. + + (References: Tero Kivinen's mail "Intent of couple of attributes in + Configuration Payload in IKEv2?", 2004-11-19. Srinivasa Rao + Addepalli's mail "INTERNAL_IP4_SUBNET and INTERNAL_IP6_SUBNET in + IKEv2", 2004-09-10. Yoav Nir's mail "Re: New I-D: IKEv2 + Clarifications and Implementation Guidelines", 2005-02-07. + "Clarifications open issue: INTERNAL_IP4_SUBNET/NETMASK" thread, + April 2005.) + +6.4. INTERNAL_IP4_NETMASK + + Section 3.15.1 defines the INTERNAL_IP4_NETMASK attribute, and says + that "The internal network's netmask. Only one netmask is allowed in + the request and reply messages (e.g., 255.255.255.0) and it MUST be + used only with an INTERNAL_IP4_ADDRESS attribute". + + However, it is not clear what exactly this attribute means, as the + concept of "netmask" is not very well defined for point-to-point + links (unlike multi-access links, where it means "you can reach hosts + inside this netmask directly using layer 2, instead of sending + packets via a router"). Even if the operating system's TCP/IP stack + + + +Eronen & Hoffman Expires November 5, 2006 [Page 40] + +Internet-Draft IKEv2 Clarifications May 2006 + + + requires a netmask to be configured, for point-to-point links it + could be just set to 255.255.255.255. So, why is this information + sent in IKEv2? + + One possible interpretation would be that the host is given a whole + block of IP addresses instead of a single address. This is also what + Framed-IP-Netmask does in [RADIUS], the IPCP "subnet mask" extension + does in PPP [IPCPSubnet], and the prefix length in the IPv6 Framed- + IPv6-Prefix attribute does in [RADIUS6]. However, nothing in the + specification supports this interpretation, and discussions on the + IPsec WG mailing list have confirmed it was not intended. Section + 3.15.1 also says that multiple addresses are assigned using multiple + INTERNAL_IP4/6_ADDRESS attributes. + + Currently, this document's interpretation is the following: + INTERNAL_IP4_NETMASK in a CFG_REPLY means roughly the same thing as + INTERNAL_IP4_SUBNET containing the same information ("send traffic to + these addresses through me"), but also implies a link boundary. For + instance, the client could use its own address and the netmask to + calculate the broadcast address of the link. (Whether the gateway + will actually deliver broadcast packets to other VPN clients and/or + other nodes connected to this link is another matter.) + + An empty INTERNAL_IP4_NETMASK attribute can be included in a + CFG_REQUEST to request this information (although the gateway can + send the information even when not requested). However, it seems + that non-empty values for this attribute do not make sense in + CFG_REQUESTs. + + Fortunately, Section 4 clearly says that a minimal implementation + does not need to include or understand the INTERNAL_IP4_NETMASK + attribute, and thus this document recommends that implementations + should not use the INTERNAL_IP4_NETMASK attribute or assume that the + other peer supports it. + + (References: Charlie Kaufman's mail "RE: Proposed Last Call based + revisions to IKEv2", 2004-05-27. Email discussion with Tero Kivinen, + Jan 2005. Yoav Nir's mail "Re: New I-D: IKEv2 Clarifications and + Implementation Guidelines", 2005-02-07. "Clarifications open issue: + INTERNAL_IP4_SUBNET/NETMASK" thread, April 2005.) + +6.5. Configuration payloads for IPv6 + + IKEv2 also defines configuration payloads for IPv6. However, they + are based on the corresponding IPv4 payloads, and do not fully follow + the "normal IPv6 way of doing things". + + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 41] + +Internet-Draft IKEv2 Clarifications May 2006 + + + A client can be assigned an IPv6 address using the + INTERNAL_IP6_ADDRESS configuration payload. A minimal exchange could + look like this: + + CP(CFG_REQUEST) = + INTERNAL_IP6_ADDRESS() + INTERNAL_IP6_DNS() + TSi = (0, 0-65535, :: - FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF) + TSr = (0, 0-65535, :: - FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF) + + CP(CFG_REPLY) = + INTERNAL_IP6_ADDRESS(2001:DB8:0:1:2:3:4:5/64) + INTERNAL_IP6_DNS(2001:DB8:99:88:77:66:55:44) + TSi = (0, 0-65535, 2001:DB8:0:1:2:3:4:5 - 2001:DB8:0:1:2:3:4:5) + TSr = (0, 0-65535, :: - FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF) + + In particular, IPv6 stateless autoconfiguration or router + advertisement messages are not used; neither is neighbor discovery. + + The client can also send a non-empty INTERNAL_IP6_ADDRESS attribute + in the CFG_REQUEST to request a specific address or interface + identifier. The gateway first checks if the specified address is + acceptable, and if it is, returns that one. If the address was not + acceptable, the gateway will attempt to use the interface identifier + with some other prefix; if even that fails, the gateway will select + another interface identifier. + + The INTERNAL_IP6_ADDRESS attribute also contains a prefix length + field. When used in a CFG_REPLY, this corresponds to the + INTERNAL_IP4_NETMASK attribute in the IPv4 case (and indeed, was + called INTERNAL_IP6_NETMASK in earlier versions of the IKEv2 draft). + See the previous section for more details. + + While this approach to configuring IPv6 addresses is reasonably + simple, it has some limitations: IPsec tunnels configured using IKEv2 + are not fully-featured "interfaces" in the IPv6 addressing + architecture [IPv6Addr] sense. In particular, they do not + necessarily have link-local addresses, and this may complicate the + use of protocols that assume them, such as [MLDv2]. (Whether they + are called "interfaces" in some particular operating system is a + different issue.) + + (References: "VPN remote host configuration IPv6 ?" thread, May 2004. + "Clarifications open issue: INTERNAL_IP4_SUBNET/NETMASK" thread, + April 2005.) + + + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 42] + +Internet-Draft IKEv2 Clarifications May 2006 + + +6.6. INTERNAL_IP6_NBNS + + Section 3.15.1 defines the INTERNAL_IP6_NBNS attribute for sending + the IPv6 address of NetBIOS name servers. + + However, NetBIOS is not defined for IPv6, and probably never will be. + Thus, this attribute most likely does not make much sense. + + (Pointed out by Bernard Aboba in the IP Configuration Security (ICOS) + BoF at IETF62.) + +6.7. INTERNAL_ADDRESS_EXPIRY + + Section 3.15.1 defines the INTERNAL_ADDRESS_EXPIRY attribute as + "Specifies the number of seconds that the host can use the internal + IP address. The host MUST renew the IP address before this expiry + time. Only one of these attributes MAY be present in the reply." + + Expiry times and explicit renewals are primarily useful in + environments like DHCP, where the server cannot reliably know when + the client has gone away. However, in IKEv2 this is known, and the + gateway can simply free the address when the IKE_SA is deleted. + + Also, Section 4 says that supporting renewals is not mandatory. + Given that this functionality is usually not needed, we recommend + that gateways should not send the INTERNAL_ADDRESS_EXPIRY attribute. + (And since this attribute does not seem to make much sense for + CFG_REQUESTs, clients should not send it either.) + + Note that according to Section 4, clients are required to understand + INTERNAL_ADDRESS_EXPIRY if they receive it. A minimum implementation + would use the value to limit the lifetime of the IKE_SA. + + (References: Tero Kivinen's mail "Comments of + draft-eronen-ipsec-ikev2-clarifications-02.txt", 2005-04-05. + "Questions about internal address" thread, April 2005.) + +6.8. Address assignment failures + + If the responder encounters an error while attempting to assign an IP + address to the initiator, it responds with an + INTERNAL_ADDRESS_FAILURE notification as described in Section 3.10.1. + However, there are some more complex error cases. + + First, if the responder does not support configuration payloads at + all, it can simply ignore all configuration payloads. This type of + implementation never sends INTERNAL_ADDRESS_FAILURE notifications. + If the initiator requires the assignment of an IP address, it will + + + +Eronen & Hoffman Expires November 5, 2006 [Page 43] + +Internet-Draft IKEv2 Clarifications May 2006 + + + treat a response without CFG_REPLY as an error. + + A second case is where the responder does support configuration + payloads, but only for particular type of addresses (IPv4 or IPv6). + Section 4 says that "A minimal IPv4 responder implementation will + ignore the contents of the CP payload except to determine that it + includes an INTERNAL_IP4_ADDRESS attribute". If, for instance, the + initiator includes both INTERNAL_IP4_ADDRESS and INTERNAL_IP6_ADDRESS + in the CFG_REQUEST, an IPv4-only responder can thus simply ignore the + IPv6 part and process the IPv4 request as usual. + + A third case is where the initiator requests multiple addresses of a + type that the responder supports: what should happen if some (but not + all) of the requests fail? It seems that an optimistic approach + would be the best one here: if the responder is able to assign at + least one address, it replies with those; it sends + INTERNAL_ADDRESS_FAILURE only if no addresses can be assigned. + + (References: "ikev2 and internal_ivpn_address" thread, June 2005.) + + +7. Miscellaneous issues + +7.1. Matching ID_IPV4_ADDR and ID_IPV6_ADDR + + When using the ID_IPV4_ADDR/ID_IPV6_ADDR identity types in IDi/IDr + payloads, IKEv2 does not require this address to match the address in + the IP header (of IKEv2 packets), or anything in the TSi/TSr + payloads. The contents of IDi/IDr is used purely to fetch the policy + and authentication data related to the other party. + + (References: "Identities types IP address,FQDN/user FQDN and DN and + its usage in preshared key authentication" thread, Jan 2005.) + +7.2. Relationship of IKEv2 to RFC4301 + + The IKEv2 specification refers to [RFC4301], but it never makes + clearly defines the exact relationship is. + + However, there are some requirements in the specification that make + it clear that IKEv2 requires [RFC4301]. In other words, an + implementation that does IPsec processing strictly according to + [RFC2401] cannot be compliant with the IKEv2 specification. + + One such example can be found in Section 2.24: "Specifically, tunnel + encapsulators and decapsulators for all tunnel-mode SAs created by + IKEv2 [...] MUST implement the tunnel encapsulation and + decapsulation processing specified in [RFC4301] to prevent discarding + + + +Eronen & Hoffman Expires November 5, 2006 [Page 44] + +Internet-Draft IKEv2 Clarifications May 2006 + + + of ECN congestion indications." + + Nevertheless, the changes required to existing [RFC2401] + implementations are not very large, especially since supporting many + of the new features (such as Extended Sequence Numbers) is optional. + +7.3. Reducing the window size + + In IKEv2, the window size is assumed to be a (possibly configurable) + property of a particular implementation, and is not related to + congestion control (unlike the window size in TCP, for instance). + + In particular, it is not defined what the responder should do when it + receives a SET_WINDOW_SIZE notification containing a smaller value + than is currently in effect. Thus, there is currently no way to + reduce the window size of an existing IKE_SA. However, when rekeying + an IKE_SA, the new IKE_SA starts with window size 1 until it is + explicitly increased by sending a new SET_WINDOW_SIZE notification. + + (References: Tero Kivinen's mail "Comments of + draft-eronen-ipsec-ikev2-clarifications-02.txt", 2005-04-05.) + +7.4. Minimum size of nonces + + Section 2.10 says that "Nonces used in IKEv2 MUST be randomly chosen, + MUST be at least 128 bits in size, and MUST be at least half the key + size of the negotiated prf." + + However, the initiator chooses the nonce before the outcome of the + negotiation is known. In this case, the nonce has to be long enough + for all the PRFs being proposed. + +7.5. Initial zero octets on port 4500 + + It is not clear whether a peer sending an IKE_SA_INIT request on port + 4500 should include the initial four zero octets. Section 2.23 talks + about how to upgrade to tunneling over port 4500 after message 2, but + it does not say what to do if message 1 is sent on port 4500. + + + + + + + + + + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 45] + +Internet-Draft IKEv2 Clarifications May 2006 + + + IKE MUST listen on port 4500 as well as port 500. + + [...] + + The IKE initiator MUST check these payloads if present and if + they do not match the addresses in the outer packet MUST tunnel + all future IKE and ESP packets associated with this IKE_SA over + UDP port 4500. + + To tunnel IKE packets over UDP port 4500, the IKE header has four + octets of zero prepended and the result immediately follows the + UDP header. [...] + + The very beginning of Section 2 says "... though IKE messages may + also be received on UDP port 4500 with a slightly different format + (see section 2.23)." + + That "slightly different format" is only described in discussing what + to do after changing to port 4500. However, [RFC3948] shows clearly + the format has the initial zeros even for initiators on port 4500. + Furthermore, without the initial zeros, the processing engine cannot + determine whether the packet is an IKE packet or an ESP packet. + + Thus, all packets sent on port 4500 need the four zero prefix; + otherwise, the receiver won't know how to handle them. + +7.6. Destination port for NAT traversal + + Section 2.23 says that "an IPsec endpoint that discovers a NAT + between it and its correspondent MUST send all subsequent traffic to + and from port 4500". + + This sentence is misleading. The peer "outside" the NAT uses source + port 4500 for the traffic it sends, but the destination port is, of + course, taken from packets sent by the peer behind the NAT. This + port number is usually dynamically allocated by the NAT. + +7.7. SPI values for messages outside of an IKE_SA + + The IKEv2 specification is not quite clear what SPI values should be + used in the IKE header for the small number of notifications that are + allowed to be sent outside of an IKE_SA. Note that such + notifications are explicitly not Informational exchanges; Section 1.5 + makes it clear that these are one-way messages that must not be + responded to. + + There are two cases when such a one-way notification can be sent: + INVALID_IKE_SPI and INVALID_SPI. + + + +Eronen & Hoffman Expires November 5, 2006 [Page 46] + +Internet-Draft IKEv2 Clarifications May 2006 + + + In case of INVALID_IKE_SPI, the message sent is a response message, + and Section 2.21 says that "If a response is sent, the response MUST + be sent to the IP address and port from whence it came with the same + IKE SPIs and the Message ID copied." + + In case of INVALID_SPI, however, there are no IKE SPI values that + would be meaningful to the recipient of such a notification. Also, + the message sent is now an INFORMATIONAL request. A strict + interpretation of the specification would require the sender to + invent garbage values for the SPI fields. However, we think this was + not the intention, and using zero values is acceptable. + + (References: "INVALID_IKE_SPI" thread, June 2005.) + +7.8. Protocol ID/SPI fields in Notify payloads + + Section 3.10 says that the Protocol ID field in Notify payloads "For + notifications that do not relate to an existing SA, this field MUST + be sent as zero and MUST be ignored on receipt". However, the + specification does not clearly say which notifications are related to + existing SAs and which are not. + + Since the main purpose of the Protocol ID field is to specify the + type of the SPI, our interpretation is that the Protocol ID field + should be non-zero only when the SPI field is non-empty. + + There are currently only two notifications where this is the case: + INVALID_SELECTORS and REKEY_SA. + +7.9. Which message should contain INITIAL_CONTACT + + The description of the INITIAL_CONTACT notification in Section 3.10.1 + says that "This notification asserts that this IKE_SA is the only + IKE_SA currently active between the authenticated identities". + However, neither Section 2.4 nor 3.10.1 says in which message this + payload should be placed. + + The general agreement is that INITIAL_CONTACT is best communicated in + the first IKE_AUTH request, not as a separate exchange afterwards. + + (References: "Clarifying the use of INITIAL_CONTACT in IKEv2" thread, + April 2005. "Initial Contact messages" thread, December 2004. + "IKEv2 and Initial Contact" thread, September 2004 and April 2005.) + +7.10. Alignment of payloads + + Many IKEv2 payloads contain fields marked as "RESERVED", mostly + because IKEv1 had them, and partly because they make the pictures + + + +Eronen & Hoffman Expires November 5, 2006 [Page 47] + +Internet-Draft IKEv2 Clarifications May 2006 + + + easier to draw. In particular, payloads in IKEv2 are not, in + general, aligned to 4-octet boundaries. (Note that payloads were not + aligned to 4-byte boundaries in IKEv1 either.) + + (References: "IKEv2: potential 4-byte alignment problem" thread, June + 2004.) + +7.11. Key length transform attribute + + Section 3.3.5 says that "The only algorithms defined in this document + that accept attributes are the AES based encryption, integrity, and + pseudo-random functions, which require a single attribute specifying + key width." + + This is incorrect. The AES-based integrity and pseudo-random + functions defined in [IKEv2] always use a 128-bit key. In fact, + there are currently no integrity or PRF algorithms that use the key + length attribute (and we recommend that they should not be defined in + the future either). + + For encryption algorithms, the situation is slightly more complex + since there are three different types of algorithms: + + o The key length attribute is never used with algorithms that use a + fixed length key, such as DES and IDEA. + + o The key length attribute is always included for the currently + defined AES-based algorithms (CBC, CTR, CCM and GCM). Omitting + the key length attribute is not allowed; if the proposal does not + contain it, the proposal has to be rejected. + + o For other algorithms, the key length attribute can be included but + is not mandatory. These algorithms include, e.g., RC5, CAST and + BLOWFISH. If the key length attribute is not included, the + default value specified in [RFC2451] is used. + +7.12. IPsec IANA considerations + + There are currently three different IANA registry files that contain + important numbers for IPsec: ikev2-registry, isakmp-registry, and + ipsec-registry. Implementors should note that IKEv2 may use numbers + different from IKEv1 for a particular algorithm. + + For instance, an encryption algorithm can have up to three different + numbers: the IKEv2 "Transform Type 1" identifier in ikev2-registry, + the IKEv1 phase 1 "Encryption Algorithm" identifier in ipsec- + registry, and the IKEv1 phase 2 "IPSEC ESP Transform Identifier" + isakmp-registry. Although some algorithms have the same number in + + + +Eronen & Hoffman Expires November 5, 2006 [Page 48] + +Internet-Draft IKEv2 Clarifications May 2006 + + + all three registries, the registries are not identical. + + Similarly, an integrity algorithm can have at least the IKEv2 + "Transform Type 3" identifier in ikev2-registry, the IKEv1 phase 2 + "IPSEC AH Transform Identifier" in isakmp-registry, and the IKEv1 + phase 2 ESP "Authentication Algorithm Security Association Attribute" + identifier in isakmp-registry. And there is also the IKEv1 phase 1 + "Hash Algorithm" list in ipsec-registry. + + This issue needs special care also when writing a specification for + how a new algorithm is used together with IPsec. + +7.13. Combining ESP and AH + + The IKEv2 specification contains some misleading text about how ESP + and AH can be combined. + + IKEv2 is based on [RFC4301] which does not include "SA bundles" that + were part of [RFC2401]. While a single packet can go through IPsec + processing multiple times, each of these passes uses a separate SA, + and the passes are coordinated by the forwarding tables. In IKEv2, + each of these SAs has to be created using a separate CREATE_CHILD_SA + exchange. Thus, the text in Section 2.7 about a single proposal + containing both ESP and AH is incorrect. + + Morever, the combination of ESP and AH (between the same endpoints) + become largely obsolete already in 1998 when RFC 2406 was published. + Our recommendation is that IKEv2 implementations should not support + this combination, and implementors should not assume the combination + can be made to work in interoperable manner. + + (References: "Rekeying SA bundles" thread, Oct 2005.) + + +8. Implementation mistakes + + Some implementers at the early IKEv2 bakeoffs didn't do everything + correctly. This may seem like an obvious statement, but it is + probably useful to list a few things that were clear in the document + and not needing clarification, that some implementors didn't do. All + of these things caused interoperability problems. + + o Some implementations continued to send traffic on a CHILD_SA after + it was rekeyed, even after receiving an DELETE payload. + + o After rekeying an IKE_SA, some implementations did not reset their + message counters to zero. One set the counter to 2, another did + not reset the counter at all. + + + +Eronen & Hoffman Expires November 5, 2006 [Page 49] + +Internet-Draft IKEv2 Clarifications May 2006 + + + o Some implementations could only handle a single pair of traffic + selectors, or would only process the first pair in the proposal. + + o Some implementations responded to a delete request by sending an + empty INFORMATIONAL response, and then initiated their own + INFORMATIONAL exchange with the pair of SAs to delete. + + o Although this did not happen at the bakeoff, from the discussion + there, it is clear that some people had not implemented message + window sizes correctly. Some implementations might have sent + messages that did not fit into the responder's message windows, + and some implementations may not have torn down an SA if they did + not ever receive a message that they know they should have. + + +9. Security considerations + + This document does not introduce any new security considerations to + IKEv2. If anything, clarifying complex areas of the specification + can reduce the likelihood of implementation problems that may have + security implications. + + +10. IANA considerations + + This document does not change or create any IANA-registered values. + + +11. Acknowledgments + + This document is mainly based on conversations on the IPsec WG + mailing list. The authors would especially like to thank Bernard + Aboba, Jari Arkko, Vijay Devarapalli, William Dixon, Francis Dupont, + Mika Joutsenvirta, Charlie Kaufman, Stephen Kent, Tero Kivinen, Yoav + Nir, Michael Richardson, and Joel Snyder for their contributions. + + In addition, the authors would like to thank all the participants of + the first public IKEv2 bakeoff, held in Santa Clara in February 2005, + for their questions and proposed clarifications. + + +12. References + +12.1. Normative References + + [IKEv2] Kaufman, C., Ed., "Internet Key Exchange (IKEv2) + Protocol", RFC 4306, December 2005. + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 50] + +Internet-Draft IKEv2 Clarifications May 2006 + + + [IKEv2ALG] + Schiller, J., "Cryptographic Algorithms for Use in the + Internet Key Exchange Version 2 (IKEv2)", RFC 4307, + December 2005. + + [PKCS1v20] + Kaliski, B. and J. Staddon, "PKCS #1: RSA Cryptography + Specifications Version 2.0", RFC 2437, October 1998. + + [PKCS1v21] + Jonsson, J. and B. Kaliski, "Public-Key Cryptography + Standards (PKCS) #1: RSA Cryptography Specifications + Version 2.1", RFC 3447, February 2003. + + [RFC2401] Kent, S. and R. Atkinson, "Security Architecture for the + Internet Protocol", RFC 2401, November 1998. + + [RFC4301] Kent, S. and K. Seo, "Security Architecture for the + Internet Protocol", RFC 4301, December 2005. + +12.2. Informative References + + [Aura05] Aura, T., Roe, M., and A. Mohammed, "Experiences with + Host-to-Host IPsec", 13th International Workshop on + Security Protocols, Cambridge, UK, April 2005. + + [EAP] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H. + Levkowetz, "Extensible Authentication Protocol (EAP)", + RFC 3748, June 2004. + + [HashUse] Hoffman, P., "Use of Hash Algorithms in IKE and IPsec", + draft-hoffman-ike-ipsec-hash-use-01 (work in progress), + December 2005. + + [IPCPSubnet] + Cisco Systems, Inc., "IPCP Subnet Mask Support + Enhancements", http://www.cisco.com/univercd/cc/td/doc/ + product/software/ios121/121newft/121limit/121dc/121dc3/ + ipcp_msk.htm, January 2003. + + [IPv6Addr] + Hinden, R. and S. Deering, "Internet Protocol Version 6 + (IPv6) Addressing Architecture", RFC 4291, April 2004. + + [MIPv6] Johnson, D., Perkins, C., and J. Arkko, "Mobility Support + in IPv6", RFC 3775, June 2004. + + [MLDv2] Vida, R. and L. Costa, "Multicast Listener Discovery + + + +Eronen & Hoffman Expires November 5, 2006 [Page 51] + +Internet-Draft IKEv2 Clarifications May 2006 + + + Version 2 (MLDv2) for IPv6", RFC 3810, June 2004. + + [NAI] Aboba, B., Beadles, M., Arkko, J., and P. Eronen, "The + Network Access Identifier", RFC 4282, December 2005. + + [PKI4IPsec] + Korver, B., "Internet PKI Profile of IKEv1/ISAKMP, IKEv2, + and PKIX", draft-ietf-pki4ipsec-ikecert-profile (work in + progress), February 2006. + + [RADEAP] Aboba, B. and P. Calhoun, "RADIUS (Remote Authentication + Dial In User Service) Support For Extensible + Authentication Protocol (EAP)", RFC 3579, September 2003. + + [RADIUS] Rigney, C., Willens, S., Rubens, A., and W. Simpson, + "Remote Authentication Dial In User Service (RADIUS)", + RFC 2865, June 2000. + + [RADIUS6] Aboba, B., Zorn, G., and D. Mitton, "RADIUS and IPv6", + RFC 3162, August 2001. + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", RFC 2119, March 1997. + + [RFC2451] Pereira, R. and R. Adams, "The ESP CBC-Mode Cipher + Algorithms", RFC 2451, November 1998. + + [RFC2822] Resnick, P., "Internet Message Format", RFC 2822, + April 2001. + + [RFC3664] Hoffman, P., "The AES-XCBC-PRF-128 Algorithm for the + Internet Key Exchange Protocol (IKE)", RFC 3664, + January 2004. + + [RFC3664bis] + Hoffman, P., "The AES-XCBC-PRF-128 Algorithm for the + Internet Key Exchange Protocol (IKE)", + draft-hoffman-rfc3664bis (work in progress), October 2005. + + [RFC3948] Huttunen, A., Swander, B., Volpe, V., DiBurro, L., and M. + Stenberg, "UDP Encapsulation of IPsec ESP Packets", + RFC 3948, January 2005. + + [RFC822] Crocker, D., "Standard for the format of ARPA Internet + text messages", RFC 822, August 1982. + + [ReAuth] Nir, Y., "Repeated Authentication in Internet Key Exchange + (IKEv2) Protocol", RFC 4478, April 2006. + + + +Eronen & Hoffman Expires November 5, 2006 [Page 52] + +Internet-Draft IKEv2 Clarifications May 2006 + + + [SCVP] Freeman, T., Housley, R., Malpani, A., Cooper, D., and T. + Polk, "Simple Certificate Validation Protocol (SCVP)", + draft-ietf-pkix-scvp-21 (work in progress), October 2005. + + +Appendix A. Exchanges and payloads + + This appendix contains a short summary of the IKEv2 exchanges, and + what payloads can appear in which message. This appendix is purely + informative; if it disagrees with the body of this document or the + IKEv2 specification, the other text is considered correct. + + Vendor-ID (V) payloads may be included in any place in any message. + This sequence shows what are, in our opinion, the most logical places + for them. + + The specification does not say which messages can contain + N(SET_WINDOW_SIZE). It can possibly be included in any message, but + it is not yet shown below. + +A.1. IKE_SA_INIT exchange + + request --> [N(COOKIE)], + SA, KE, Ni, + [N(NAT_DETECTION_SOURCE_IP)+, + N(NAT_DETECTION_DESTINATION_IP)], + [V+] + + normal response <-- SA, KE, Nr, + (no cookie) [N(NAT_DETECTION_SOURCE_IP), + N(NAT_DETECTION_DESTINATION_IP)], + [[N(HTTP_CERT_LOOKUP_SUPPORTED)], CERTREQ+], + [V+] + + + + + + + + + + + + + + + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 53] + +Internet-Draft IKEv2 Clarifications May 2006 + + +A.2. IKE_AUTH exchange without EAP + + request --> IDi, [CERT+], + [N(INITIAL_CONTACT)], + [[N(HTTP_CERT_LOOKUP_SUPPORTED)], CERTREQ+], + [IDr], + AUTH, + [CP(CFG_REQUEST)], + [N(IPCOMP_SUPPORTED)+], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, TSi, TSr, + [V+] + + response <-- IDr, [CERT+], + AUTH, + [CP(CFG_REPLY)], + [N(IPCOMP_SUPPORTED)], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, TSi, TSr, + [N(ADDITIONAL_TS_POSSIBLE)], + [V+] + + + + + + + + + + + + + + + + + + + + + + + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 54] + +Internet-Draft IKEv2 Clarifications May 2006 + + +A.3. IKE_AUTH exchange with EAP + + first request --> IDi, + [N(INITIAL_CONTACT)], + [[N(HTTP_CERT_LOOKUP_SUPPORTED)], CERTREQ+], + [IDr], + [CP(CFG_REQUEST)], + [N(IPCOMP_SUPPORTED)+], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, TSi, TSr, + [V+] + + first response <-- IDr, [CERT+], AUTH, + EAP, + [V+] + + / --> EAP + repeat 1..N times | + \ <-- EAP + + last request --> AUTH + + last response <-- AUTH, + [CP(CFG_REPLY)], + [N(IPCOMP_SUPPORTED)], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, TSi, TSr, + [N(ADDITIONAL_TS_POSSIBLE)], + [V+] + + + + + + + + + + + + + + + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 55] + +Internet-Draft IKEv2 Clarifications May 2006 + + +A.4. CREATE_CHILD_SA exchange for creating/rekeying CHILD_SAs + + request --> [N(REKEY_SA)], + [N(IPCOMP_SUPPORTED)+], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, Ni, [KEi], TSi, TSr + + response <-- [N(IPCOMP_SUPPORTED)], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, Nr, [KEr], TSi, TSr, + [N(ADDITIONAL_TS_POSSIBLE)] + +A.5. CREATE_CHILD_SA exchange for rekeying the IKE_SA + + request --> SA, Ni, [KEi] + + response <-- SA, Nr, [KEr] + +A.6. INFORMATIONAL exchange + + request --> [N+], + [D+], + [CP(CFG_REQUEST)] + + response <-- [N+], + [D+], + [CP(CFG_REPLY)] + + +Authors' Addresses + + Pasi Eronen + Nokia Research Center + P.O. Box 407 + FIN-00045 Nokia Group + Finland + + Email: pasi.eronen@nokia.com + + + + + + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 56] + +Internet-Draft IKEv2 Clarifications May 2006 + + + Paul Hoffman + VPN Consortium + 127 Segre Place + Santa Cruz, CA 95060 + USA + + Email: paul.hoffman@vpnc.org + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 57] + +Internet-Draft IKEv2 Clarifications May 2006 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2006). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at + ietf-ipr@ietf.org. + + +Acknowledgment + + Funding for the RFC Editor function is provided by the IETF + Administrative Support Activity (IASA). + + + + + +Eronen & Hoffman Expires November 5, 2006 [Page 58] + + diff --git a/doc/standards/draft-eronen-ipsec-ikev2-eap-auth-05.txt b/doc/standards/draft-eronen-ipsec-ikev2-eap-auth-05.txt new file mode 100644 index 000000000..f5fd3cc0c --- /dev/null +++ b/doc/standards/draft-eronen-ipsec-ikev2-eap-auth-05.txt @@ -0,0 +1,729 @@ + + + +Network Working Group P. Eronen +Internet-Draft Nokia +Expires: December 28, 2006 H. Tschofenig + Siemens + June 26, 2006 + + + Extension for EAP Authentication in IKEv2 + draft-eronen-ipsec-ikev2-eap-auth-05.txt + +Status of this Memo + + By submitting this Internet-Draft, each author represents that any + applicable patent or other IPR claims of which he or she is aware + have been or will be disclosed, and any of which he or she becomes + aware will be disclosed, in accordance with Section 6 of BCP 79. + + Internet-Drafts are working documents of the Internet Engineering + Task Force (IETF), its areas, and its working groups. Note that + other groups may also distribute working documents as Internet- + Drafts. + + Internet-Drafts are draft documents valid for a maximum of six months + and may be updated, replaced, or obsoleted by other documents at any + time. It is inappropriate to use Internet-Drafts as reference + material or to cite them other than as "work in progress." + + The list of current Internet-Drafts can be accessed at + http://www.ietf.org/ietf/1id-abstracts.txt. + + The list of Internet-Draft Shadow Directories can be accessed at + http://www.ietf.org/shadow.html. + + This Internet-Draft will expire on December 28, 2006. + +Copyright Notice + + Copyright (C) The Internet Society (2006). + +Abstract + + IKEv2 specifies that EAP authentication must be used together with + public key signature based responder authentication. This is + necessary with old EAP methods that provide only unilateral + authentication using, e.g., one-time passwords or token cards. + + This document specifies how EAP methods that provide mutual + authentication and key agreement can be used to provide extensible + + + +Eronen & Tschofenig Expires December 28, 2006 [Page 1] + +Internet-Draft Extension for EAP in IKEv2 June 2006 + + + responder authentication for IKEv2 based on other methods than public + key signatures. + + +1. Introduction + + The Extensible Authentication Protocol (EAP), defined in [4], is an + authentication framework which supports multiple authentication + mechanisms. Today, EAP has been implemented at end hosts and routers + that connect via switched circuits or dial-up lines using PPP [13], + IEEE 802 wired switches [9], and IEEE 802.11 wireless access points + [11]. + + One of the advantages of the EAP architecture is its flexibility. + EAP is used to select a specific authentication mechanism, typically + after the authenticator requests more information in order to + determine the specific authentication method to be used. Rather than + requiring the authenticator (e.g., wireless LAN access point) to be + updated to support each new authentication method, EAP permits the + use of a backend authentication server which may implement some or + all authentication methods. + + IKEv2 [3] is a component of IPsec used for performing mutual + authentication and establishing and maintaining security associations + for IPsec ESP and AH. In addition to supporting authentication using + public key signatures and shared secrets, IKEv2 also supports EAP + authentication. + + IKEv2 provides EAP authentication since it was recognized that public + key signatures and shared secrets are not flexible enough to meet the + requirements of many deployment scenarios. By using EAP, IKEv2 can + leverage existing authentication infrastructure and credential + databases, since EAP allows users to choose a method suitable for + existing credentials, and also makes separation of the IKEv2 + responder (VPN gateway) from the EAP authentication endpoint (backend + AAA server) easier. + + Some older EAP methods are designed for unilateral authentication + only (that is, EAP peer to EAP server). These methods are used in + conjunction with IKEv2 public key based authentication of the + responder to the initiator. It is expected that this approach is + especially useful for "road warrior" VPN gateways that use, for + instance, one-time passwords or token cards to authenticate the + clients. + + However, most newer EAP methods, such as those typically used with + IEEE 802.11i wireless LANs, provide mutual authentication and key + agreement. Currently, IKEv2 specifies that also these EAP methods + + + +Eronen & Tschofenig Expires December 28, 2006 [Page 2] + +Internet-Draft Extension for EAP in IKEv2 June 2006 + + + must be used together with public key signature based responder + authentication. + + In some environments, requiring the deployment of PKI for just this + purpose can be counterproductive. Deploying new infrastructure can + be expensive, and it may weaken security by creating new + vulnerabilities. Mutually authenticating EAP methods alone can + provide a sufficient level of security in many circumstances, and + indeed, IEEE 802.11i uses EAP without any PKI for authenticating the + WLAN access points. + + This document specifies how EAP methods that offer mutual + authentication and key agreement can be used to provide responder + authentication in IKEv2 completely based on EAP. + +1.1. Terminology + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in [2]. + + +2. Scenarios + + In this section we describe two scenarios for extensible + authentication within IKEv2. These scenarios are intended to be + illustrative examples rather than specifying how things should be + done. + + Figure 1 shows a configuration where the EAP and the IKEv2 endpoints + are co-located. Authenticating the IKEv2 responder using both EAP + and public key signatures is redundant. Offering EAP based + authentication has the advantage that multiple different + authentication and key exchange protocols are available with EAP with + different security properties (such as strong password based + protocols, protocols offering user identity confidentiality and many + more). As an example it is possible to use GSS-API support within + EAP [6] to support Kerberos based authentication which effectively + replaces the need for KINK [14]. + + +------+-----+ +------------+ + O | IKEv2 | | IKEv2 | + /|\ | Initiator |<---////////////////////--->| Responder | + / \ +------------+ IKEv2 +------------+ + User | EAP Peer | Exchange | EAP Server | + +------------+ +------------+ + + Figure 1: EAP and IKEv2 endpoints are co-located + + + +Eronen & Tschofenig Expires December 28, 2006 [Page 3] + +Internet-Draft Extension for EAP in IKEv2 June 2006 + + + Figure 2 shows a typical corporate network access scenario. The + initiator (client) interacts with the responder (VPN gateway) in the + corporate network. The EAP exchange within IKE runs between the + client and the home AAA server. As a result of a successful EAP + authentication protocol run, session keys are established and sent + from the AAA server to the VPN gateway, and then used to authenticate + the IKEv2 SA with AUTH payloads. + + The protocol used between the VPN gateway and AAA server could be, + for instance, Diameter [4] or RADIUS [5]. See Section 5 for related + security considerations. + + +-------------------------------+ + | Corporate network | + | | + +-----------+ +--------+ | + | IKEv2 | AAA | Home | | + IKEv2 +////----->+ Responder +<---------->+ AAA | | + Exchange / | (VPN GW) | (RADIUS/ | Server | | + / +-----------+ Diameter) +--------+ | + / | carrying EAP | + | | | + | +-------------------------------+ + v + +------+-----+ + o | IKEv2 | + /|\ | Initiator | + / \ | VPN client | + User +------------+ + + Figure 2: Corporate Network Access + + +3. Solution + + IKEv2 specifies that when the EAP method establishes a shared secret + key, that key is used by both the initiator and responder to generate + an AUTH payload (thus authenticating the IKEv2 SA set up by messages + 1 and 2). + + When used together with public key responder authentication, the + responder is in effect authenticated using two different methods: the + public key signature AUTH payload in message 4, and the EAP-based + AUTH payload later. + + If the initiator does not wish to use public key based responder + authentication, it includes an EAP_ONLY_AUTHENTICATION notification + payload (type TBD-BY-IANA) in message 3. The SPI size field is set + + + +Eronen & Tschofenig Expires December 28, 2006 [Page 4] + +Internet-Draft Extension for EAP in IKEv2 June 2006 + + + to zero, and there is no additional data associated with this + notification. + + If the responder supports this notification, it omits the public key + based AUTH payload and CERT payloads from message 4. + + If the responder does not support the EAP_ONLY_AUTHENTICATION + notification, it ignores the notification payload, and includes the + AUTH payload in message 4. In this case the initiator can, based on + its local policy, choose to either ignore the AUTH payload, or verify + it and any associated certificates as usual. + + Both the initiator and responder MUST verify that the EAP method + actually used provided mutual authentication and established a shared + secret key. The AUTH payloads sent after EAP Success MUST use the + EAP-generated key, and MUST NOT use SK_pi or SK_pr. + + An IKEv2 message exchange with this modification is shown below: + + + Initiator Responder + ----------- ----------- + HDR, SAi1, KEi, Ni, + [N(NAT_DETECTION_SOURCE_IP), + N(NAT_DETECTION_DESTINATION_IP)] --> + + <-- HDR, SAr1, KEr, Nr, [CERTREQ], + [N(NAT_DETECTION_SOURCE_IP), + N(NAT_DETECTION_DESTINATION_IP)] + + HDR, SK { IDi, [IDr], SAi2, TSi, TSr, + N(EAP_ONLY_AUTHENTICATION), + [CP(CFG_REQUEST)] } --> + + <-- HDR, SK { IDr, EAP(Request) } + + HDR, SK { EAP(Response) } --> + + <-- HDR, SK { EAP(Request) } + + HDR, SK { EAP(Response) } --> + + <-- HDR, SK { EAP(Success) } + + HDR, SK { AUTH } --> + + <-- HDR, SK { AUTH, SAr2, TSi, TSr, + [CP(CFG_REPLY] } + + + +Eronen & Tschofenig Expires December 28, 2006 [Page 5] + +Internet-Draft Extension for EAP in IKEv2 June 2006 + + + The NAT detection and Configuration payloads are shown for + informative purposes only; they do not change how EAP authentication + works. + + +4. IANA considerations + + This document defines a new IKEv2 Notification Payload type, + EAP_ONLY_AUTHENTICATION, described in Section 3. This payload must + be assigned a new type number from the "status types" range. + + This document does not define any new namespaces to be managed by + IANA. + + +5. Security Considerations + + Security considerations applicable to all EAP methods are discussed + in [1]. The EAP Key Management Framework [7] deals with issues that + arise when EAP is used as a part of a larger system. + +5.1. Authentication of IKEv2 SA + + It is important to note that the IKEv2 SA is not authenticated by + just running an EAP conversation: the crucial step is the AUTH + payload based on the EAP-generated key. Thus, EAP methods that do + not provide mutual authentication or establish a shared secret key + MUST NOT be used with the modifications presented in this document. + +5.2. Authentication with separated IKEv2 responder/EAP server + + As described in Section 2, the EAP conversation can terminate either + at the IKEv2 responder or at a backend AAA server. + + If the EAP method terminates at the IKEv2 responder then no key + transport via the AAA infrastructure is required. Pre-shared secret + and public key based authentication offered by IKEv2 is then replaced + by a wider range of authentication and key exchange methods. + + However, typically EAP will be used with a backend AAA server. See + [7] for a more complete discussion of the related security issues; + here we provide only a short summary. + + When a backend server is used, there are actually two authentication + exchanges: the EAP method between the client and the AAA server, and + another authentication between the AAA server and IKEv2 gateway. The + AAA server authenticates the client using the selected EAP method, + and they establish a session key. The AAA server then sends this key + + + +Eronen & Tschofenig Expires December 28, 2006 [Page 6] + +Internet-Draft Extension for EAP in IKEv2 June 2006 + + + to the IKEv2 gateway over a connection authenticated using, e.g., + IPsec or TLS. + + Some EAP methods do not have any concept of pass-through + authenticator (e.g., NAS or IKEv2 gateway) identity, and these two + authentications remain quite independent of each other. That is, + after the client has verified the AUTH payload sent by the IKEv2 + gateway, it knows that it is talking to SOME gateway trusted by the + home AAA server, but not which one. The situation is somewhat + similar if a single cryptographic hardware accelerator, containing a + single private key, would be shared between multiple IKEv2 gateways + (perhaps in some kind of cluster configuration). In particular, if + one of the gateways is compromised, it can impersonate any of the + other gateways towards the user (until the compromise is discovered + and access rights revoked). + + In some environments it is not desirable to trust the IKEv2 gateways + this much (also known as the "Lying NAS Problem"). EAP methods that + provide what is called "connection binding" or "channel binding" + transport some identity or identities of the gateway (or WLAN access + point/NAS) inside the EAP method. Then the AAA server can check that + it is indeed sending the key to the gateway expected by the client. + A potential solution is described in [16]. + + In some deployment configurations, AAA proxies may be present between + the IKEv2 gateway and the backend AAA server. These AAA proxies MUST + be trusted for secure operation, and therefore SHOULD be avoided when + possible; see [4] and [7] for more discussion. + +5.3. Protection of EAP payloads + + Although the EAP payloads are encrypted and integrity protected with + SK_e/SK_a, this does not provide any protection against active + attackers. Until the AUTH payload has been received and verified, a + man-in-the-middle can change the KEi/KEr payloads and eavesdrop or + modify the EAP payloads. + + In IEEE 802.11i WLANs, the EAP payloads are neither encrypted nor + integrity protected (by the link layer), so EAP methods are typically + designed to take that into account. + + In particular, EAP methods that are vulnerable to dictionary attacks + when used in WLANs are still vulnerable (to active attackers) when + run inside IKEv2. + +5.4. User identity confidentiality + + IKEv2 provides confidentiality for the initiator identity against + + + +Eronen & Tschofenig Expires December 28, 2006 [Page 7] + +Internet-Draft Extension for EAP in IKEv2 June 2006 + + + passive eavesdroppers, but not against active attackers. The + initiator announces its identity first (in message #3), before the + responder has been authenticated. The usage of EAP in IKEv2 does not + change this situation, since the ID payload in message #3 is used + instead of the EAP Identity Request/Response exchange. This is + somewhat unfortunate since when EAP is used with public key + authentication of the responder, it would be possible to provide + active user identity confidentiality for the initiator. + + IKEv2 protects the responder identity even against active attacks. + This property cannot be provided when using EAP. If public key + responder authentication is used in addition to EAP, the responder + reveals its identity before authenticating the initiator. If only + EAP is used (as proposed in this document), the situation depends on + the EAP method used (in some EAP methods, the server reveals its + identity first). + + Hence, if active user identity confidentiality for the initiator is + required then EAP methods that offer this functionality have to be + used (see [1], Section 7.3). + + +6. Acknowledgments + + This document borrows some text from [1], [3], and [4]. We would + also like to thank Hugo Krawczyk for interesting discussions about + this topic. + + +7. References + +7.1. Normative References + + [1] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H. + Levkowetz, "Extensible Authentication Protocol (EAP)", RFC 3748, + June 2004. + + [2] Bradner, S., "Key words for use in RFCs to Indicate Requirement + Levels", RFC 2119, March 1997. + + [3] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol", RFC 4306, + December 2005. + + [4] Eronen, P., Hiller, T., and G. Zorn, "Diameter Extensible + Authentication Protocol (EAP) Application", RFC 4072, + August 2005. + + + + + +Eronen & Tschofenig Expires December 28, 2006 [Page 8] + +Internet-Draft Extension for EAP in IKEv2 June 2006 + + +7.2. Informative References + + [5] Aboba, B. and P. Calhoun, "RADIUS (Remote Authentication Dial + In User Service) Support For Extensible Authentication Protocol + (EAP)", RFC 3579, September 2003. + + [6] Aboba, B. and D. Simon, "EAP GSS Authentication Protocol", + draft-aboba-pppext-eapgss-12 (work in progress), April 2002. + + [7] Aboba, B., "Extensible Authentication Protocol (EAP) Key + Management Framework", draft-ietf-eap-keying-13 (work in + progress), May 2006. + + [8] Forsberg, D., "Protocol for Carrying Authentication for Network + Access (PANA)", draft-ietf-pana-pana-11 (work in progress), + March 2006. + + [9] Institute of Electrical and Electronics Engineers, "Local and + Metropolitan Area Networks: Port-Based Network Access Control", + IEEE Standard 802.1X-2001, 2001. + + [10] Institute of Electrical and Electronics Engineers, "Information + technology - Telecommunications and information exchange + between systems - Local and metropolitan area networks - + Specific Requirements Part 11: Wireless LAN Medium Access + Control (MAC) and Physical Layer (PHY) Specifications", IEEE + Standard 802.11-1999, 1999. + + [11] Institute of Electrical and Electronics Engineers, "IEEE + Standard for Information technology - Telecommunications and + information exchange between systems - Local and metropolitan + area networks - Specific requirements - Part 11: Wireless + Medium Access Control (MAC) and Physical Layer (PHY) + specifications: Amendment 6: Medium Access Control (MAC) + Security Enhancements", IEEE Standard 802.11i-2004, July 2004. + + [12] Rigney, C., Willens, S., Rubens, A., and W. Simpson, "Remote + Authentication Dial In User Service (RADIUS)", RFC 2865, + June 2000. + + [13] Simpson, W., "The Point-to-Point Protocol (PPP)", STD 51, + RFC 1661, July 1994. + + [14] Sakane, S., Kamada, K., Thomas, M., and J. Vilhuber, + "Kerberized Internet Negotiation of Keys (KINK)", RFC 4430, + March 2006. + + [15] Tschofenig, H., "EAP IKEv2 Method", + + + +Eronen & Tschofenig Expires December 28, 2006 [Page 9] + +Internet-Draft Extension for EAP in IKEv2 June 2006 + + + draft-tschofenig-eap-ikev2-11 (work in progress), June 2006. + + [16] Arkko, J. and P. Eronen, "Authenticated Service Information for + the Extensible Authentication Protocol (EAP)", + draft-arkko-eap-service-identity-auth-04 (work in progress), + October 2005. + + +Appendix A. Alternative Approaches + + In this section we list alternatives which have been considered + during the work on this document. Finally, the solution presented in + Section 3 seems to fit better into IKEv2. + +A.1. Ignore AUTH payload at the initiator + + With this approach, the initiator simply ignores the AUTH payload in + message #4 (but obviously must check the second AUTH payload later!). + The main advantage of this approach is that no protocol modifications + are required and no signature verification is required. + + The initiator could signal the responder (using a NOTIFY payload) + that it did not verify the first AUTH payload. + +A.2. Unauthenticated PKs in AUTH payload (message 4) + + The first solution approach suggests the use of unauthenticated + public keys in the public key signature AUTH payload (for message 4). + + That is, the initiator verifies the signature in the AUTH payload, + but does not verify that the public key indeed belongs to the + intended party (using certificates)--since it doesn't have a PKI that + would allow this. This could be used with X.509 certificates (the + initiator ignores all other fields of the certificate except the + public key), or "Raw RSA Key" CERT payloads. + + This approach has the advantage that initiators that wish to perform + certificate-based responder authentication (in addition to EAP) may + do so, without requiring the responder to handle these cases + separately. + + If using RSA, the overhead of signature verification is quite small + (compared to g^xy calculation). + +A.3. Use EAP derived session keys for IKEv2 + + It has been proposed that when using an EAP methods that provides + mutual authentication and key agreement, the IKEv2 Diffie-Hellman + + + +Eronen & Tschofenig Expires December 28, 2006 [Page 10] + +Internet-Draft Extension for EAP in IKEv2 June 2006 + + + exchange could also be omitted. This would mean that the sessions + keys for IPsec SAs established later would rely only on EAP-provided + keys. + + It seems the only benefit of this approach is saving some computation + time (g^xy calculation). This approach requires designing a + completely new protocol (which would not resemble IKEv2 anymore) we + do not believe that it should be considered. Nevertheless, we + include it for completeness. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Eronen & Tschofenig Expires December 28, 2006 [Page 11] + +Internet-Draft Extension for EAP in IKEv2 June 2006 + + +Authors' Addresses + + Pasi Eronen + Nokia Research Center + P.O. Box 407 + FIN-00045 Nokia Group + Finland + + Email: pasi.eronen@nokia.com + + + Hannes Tschofenig + Siemens + Otto-Hahn-Ring 6 + Munich, Bayern 81739 + Germany + + Email: Hannes.Tschofenig@siemens.com + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Eronen & Tschofenig Expires December 28, 2006 [Page 12] + +Internet-Draft Extension for EAP in IKEv2 June 2006 + + +Intellectual Property Statement + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at + ietf-ipr@ietf.org. + + +Disclaimer of Validity + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + + +Copyright Statement + + Copyright (C) The Internet Society (2006). This document is subject + to the rights, licenses and restrictions contained in BCP 78, and + except as set forth therein, the authors retain all their rights. + + +Acknowledgment + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + +Eronen & Tschofenig Expires December 28, 2006 [Page 13] + + diff --git a/doc/standards/draft-hoffman-ikev2-1-00.txt b/doc/standards/draft-hoffman-ikev2-1-00.txt new file mode 100644 index 000000000..cd6b0ec22 --- /dev/null +++ b/doc/standards/draft-hoffman-ikev2-1-00.txt @@ -0,0 +1,6720 @@ + + + +Network Working Group P. Hoffman +Internet-Draft VPN Consortium +Expires: July 5, 2006 January 2006 + + + Internet Key Exchange Protocol: IKEv2.1 + draft-hoffman-ikev2-1-00.txt + +Status of this Memo + + By submitting this Internet-Draft, each author represents that any + applicable patent or other IPR claims of which he or she is aware + have been or will be disclosed, and any of which he or she becomes + aware will be disclosed, in accordance with Section 6 of BCP 79. + + Internet-Drafts are working documents of the Internet Engineering + Task Force (IETF), its areas, and its working groups. Note that + other groups may also distribute working documents as Internet- + Drafts. + + Internet-Drafts are draft documents valid for a maximum of six months + and may be updated, replaced, or obsoleted by other documents at any + time. It is inappropriate to use Internet-Drafts as reference + material or to cite them other than as "work in progress." + + The list of current Internet-Drafts can be accessed at + http://www.ietf.org/ietf/1id-abstracts.txt. + + The list of Internet-Draft Shadow Directories can be accessed at + http://www.ietf.org/shadow.html. + + This Internet-Draft will expire on July 5, 2006. + +Copyright Notice + + Copyright (C) The Internet Society (2006). + +Abstract + + This document describes version 2.1 of the Internet Key Exchange + (IKE) protocol. IKEv2.1 is heavily based on IKEv2 from RFC 4306 + (edited by Charlie Kaufman), and includes all of the clarifications + from the "IKEv2 Clarifications" document (edited by Pasi Eronen and + Paul Hoffman). IKEv2.1 makes additional changes to those two + documents in places where IKEv2 was unclear and the clarifications + document did not commit to a particular protocol interpretation. + + + + + +Hoffman Expires July 5, 2006 [Page 1] + +Internet-Draft IKEv2 January 2006 + + +Table of Contents + + 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 5 + 1.1. Usage Scenarios . . . . . . . . . . . . . . . . . . . . . 6 + 1.1.1. Security Gateway to Security Gateway Tunnel . . . . . 7 + 1.1.2. Endpoint-to-Endpoint Transport . . . . . . . . . . . 7 + 1.1.3. Endpoint to Security Gateway Tunnel . . . . . . . . . 8 + 1.1.4. Other Scenarios . . . . . . . . . . . . . . . . . . . 9 + 1.2. The Initial Exchanges . . . . . . . . . . . . . . . . . . 9 + 1.3. The CREATE_CHILD_SA Exchange . . . . . . . . . . . . . . 12 + 1.3.1. Creating New CHILD_SAs with the CREATE_CHILD_SA + Exchange . . . . . . . . . . . . . . . . . . . . . . 13 + 1.3.2. Rekeying IKE_SAs with the CREATE_CHILD_SA Exchange . 13 + 1.3.3. Rekeying CHILD_SAs with the CREATE_CHILD_SA + Exchange . . . . . . . . . . . . . . . . . . . . . . 14 + 1.4. The INFORMATIONAL Exchange . . . . . . . . . . . . . . . 15 + 1.5. Informational Messages outside of an IKE_SA . . . . . . . 16 + 1.6. Requirements Terminology . . . . . . . . . . . . . . . . 17 + 1.7. Introduction to IKEv2.1 . . . . . . . . . . . . . . . . . 17 + 2. IKE Protocol Details and Variations . . . . . . . . . . . . . 18 + 2.1. Use of Retransmission Timers . . . . . . . . . . . . . . 19 + 2.2. Use of Sequence Numbers for Message ID . . . . . . . . . 19 + 2.3. Window Size for Overlapping Requests . . . . . . . . . . 20 + 2.4. State Synchronization and Connection Timeouts . . . . . . 21 + 2.5. Version Numbers and Forward Compatibility . . . . . . . . 23 + 2.6. Cookies . . . . . . . . . . . . . . . . . . . . . . . . . 25 + 2.6.1. Interaction of COOKIE and INVALID_KE_PAYLOAD . . . . 27 + 2.7. Cryptographic Algorithm Negotiation . . . . . . . . . . . 28 + 2.8. Rekeying . . . . . . . . . . . . . . . . . . . . . . . . 29 + 2.8.1. Simultaneous CHILD_SA rekeying . . . . . . . . . . . 31 + 2.8.2. Rekeying the IKE_SA Versus Reauthentication . . . . . 33 + 2.9. Traffic Selector Negotiation . . . . . . . . . . . . . . 34 + 2.9.1. Traffic Selectors Violating Own Policy . . . . . . . 37 + 2.10. Nonces . . . . . . . . . . . . . . . . . . . . . . . . . 38 + 2.11. Address and Port Agility . . . . . . . . . . . . . . . . 38 + 2.12. Reuse of Diffie-Hellman Exponentials . . . . . . . . . . 38 + 2.13. Generating Keying Material . . . . . . . . . . . . . . . 39 + 2.14. Generating Keying Material for the IKE_SA . . . . . . . . 40 + 2.15. Authentication of the IKE_SA . . . . . . . . . . . . . . 41 + 2.16. Extensible Authentication Protocol Methods . . . . . . . 43 + 2.17. Generating Keying Material for CHILD_SAs . . . . . . . . 45 + 2.18. Rekeying IKE_SAs Using a CREATE_CHILD_SA Exchange . . . . 46 + 2.19. Requesting an Internal Address on a Remote Network . . . 47 + 2.20. Requesting the Peer's Version . . . . . . . . . . . . . . 48 + 2.21. Error Handling . . . . . . . . . . . . . . . . . . . . . 49 + 2.22. IPComp . . . . . . . . . . . . . . . . . . . . . . . . . 50 + 2.23. NAT Traversal . . . . . . . . . . . . . . . . . . . . . . 50 + 2.24. Explicit Congestion Notification (ECN) . . . . . . . . . 53 + + + +Hoffman Expires July 5, 2006 [Page 2] + +Internet-Draft IKEv2 January 2006 + + + 3. Header and Payload Formats . . . . . . . . . . . . . . . . . 53 + 3.1. The IKE Header . . . . . . . . . . . . . . . . . . . . . 53 + 3.2. Generic Payload Header . . . . . . . . . . . . . . . . . 56 + 3.3. Security Association Payload . . . . . . . . . . . . . . 58 + 3.3.1. Proposal Substructure . . . . . . . . . . . . . . . . 60 + 3.3.2. Transform Substructure . . . . . . . . . . . . . . . 62 + 3.3.3. Valid Transform Types by Protocol . . . . . . . . . . 64 + 3.3.4. Mandatory Transform IDs . . . . . . . . . . . . . . . 65 + 3.3.5. Transform Attributes . . . . . . . . . . . . . . . . 66 + 3.3.6. Attribute Negotiation . . . . . . . . . . . . . . . . 67 + 3.4. Key Exchange Payload . . . . . . . . . . . . . . . . . . 68 + 3.5. Identification Payloads . . . . . . . . . . . . . . . . . 69 + 3.6. Certificate Payload . . . . . . . . . . . . . . . . . . . 71 + 3.7. Certificate Request Payload . . . . . . . . . . . . . . . 74 + 3.8. Authentication Payload . . . . . . . . . . . . . . . . . 76 + 3.9. Nonce Payload . . . . . . . . . . . . . . . . . . . . . . 77 + 3.10. Notify Payload . . . . . . . . . . . . . . . . . . . . . 77 + 3.10.1. Notify Message Types . . . . . . . . . . . . . . . . 78 + 3.11. Delete Payload . . . . . . . . . . . . . . . . . . . . . 84 + 3.12. Vendor ID Payload . . . . . . . . . . . . . . . . . . . . 85 + 3.13. Traffic Selector Payload . . . . . . . . . . . . . . . . 86 + 3.13.1. Traffic Selector . . . . . . . . . . . . . . . . . . 88 + 3.14. Encrypted Payload . . . . . . . . . . . . . . . . . . . . 90 + 3.15. Configuration Payload . . . . . . . . . . . . . . . . . . 92 + 3.15.1. Configuration Attributes . . . . . . . . . . . . . . 94 + 3.15.2. Meaning of INTERNAL_IP4_SUBNET/INTERNAL_IP6_SUBNET . 97 + 3.15.3. Configuration payloads for IPv6 . . . . . . . . . . . 99 + 3.15.4. Address Assignment Failures . . . . . . . . . . . . . 100 + 3.16. Extensible Authentication Protocol (EAP) Payload . . . . 100 + 4. Conformance Requirements . . . . . . . . . . . . . . . . . . 102 + 5. Security Considerations . . . . . . . . . . . . . . . . . . . 104 + 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 107 + 7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 107 + 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 108 + 8.1. Normative References . . . . . . . . . . . . . . . . . . 108 + 8.2. Informative References . . . . . . . . . . . . . . . . . 109 + Appendix A. Summary of changes from IKEv1 . . . . . . . . . . . 112 + Appendix B. Diffie-Hellman Groups . . . . . . . . . . . . . . . 114 + B.1. Group 1 - 768 Bit MODP . . . . . . . . . . . . . . . . . 114 + B.2. Group 2 - 1024 Bit MODP . . . . . . . . . . . . . . . . . 114 + Appendix C. Exchanges and Payloads . . . . . . . . . . . . . . . 115 + C.1. IKE_SA_INIT Exchange . . . . . . . . . . . . . . . . . . 115 + C.2. IKE_AUTH Exchange without EAP . . . . . . . . . . . . . . 116 + C.3. IKE_AUTH Exchange with EAP . . . . . . . . . . . . . . . 117 + C.4. CREATE_CHILD_SA Exchange for Creating or Rekeying + CHILD_SAs . . . . . . . . . . . . . . . . . . . . . . . . 118 + C.5. CREATE_CHILD_SA Exchange for Rekeying the IKE_SA . . . . 118 + C.6. INFORMATIONAL Exchange . . . . . . . . . . . . . . . . . 118 + + + +Hoffman Expires July 5, 2006 [Page 3] + +Internet-Draft IKEv2 January 2006 + + + Appendix D. Changes Between Internet Draft Versions . . . . . . 118 + D.1. Changes from IKEv2 to draft -00 . . . . . . . . . . . . . 118 + Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 119 + Intellectual Property and Copyright Statements . . . . . . . . . 119 + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Hoffman Expires July 5, 2006 [Page 4] + +Internet-Draft IKEv2 January 2006 + + +1. Introduction + + {{ An introduction to IKEv2.1 is given at the end of Section 1. It + is put there (instead of here) to preserve the section numbering of + the original IKEv2 document. }} + + IP Security (IPsec) provides confidentiality, data integrity, access + control, and data source authentication to IP datagrams. These + services are provided by maintaining shared state between the source + and the sink of an IP datagram. This state defines, among other + things, the specific services provided to the datagram, which + cryptographic algorithms will be used to provide the services, and + the keys used as input to the cryptographic algorithms. + + Establishing this shared state in a manual fashion does not scale + well. Therefore, a protocol to establish this state dynamically is + needed. This memo describes such a protocol -- the Internet Key + Exchange (IKE). This is version 2.1 of IKE. Version 1 of IKE was + defined in RFCs 2407 [DOI], 2408 [ISAKMP], and 2409 [IKEV1]. IKEv2 + was defined in [IKEV2]. This single document is intended to replace + all three of those RFCs. + + Definitions of the primitive terms in this document (such as Security + Association or SA) can be found in [IPSECARCH]. {{ Clarif-7.2 }} It + should be noted that parts of IKEv2 and IKEv2.1 rely on some of the + processing rules in [IPSECARCH], as described in various sections of + this document. + + IKE performs mutual authentication between two parties and + establishes an IKE security association (SA) that includes shared + secret information that can be used to efficiently establish SAs for + Encapsulating Security Payload (ESP) [ESP] and/or Authentication + Header (AH) [AH] and a set of cryptographic algorithms to be used by + the SAs to protect the traffic that they carry. In this document, + the term "suite" or "cryptographic suite" refers to a complete set of + algorithms used to protect an SA. An initiator proposes one or more + suites by listing supported algorithms that can be combined into + suites in a mix-and-match fashion. IKE can also negotiate use of IP + Compression (IPComp) [IPCOMP] in connection with an ESP and/or AH SA. + We call the IKE SA an "IKE_SA". The SAs for ESP and/or AH that get + set up through that IKE_SA we call "CHILD_SAs". + + All IKE communications consist of pairs of messages: a request and a + response. The pair is called an "exchange". We call the first + messages establishing an IKE_SA IKE_SA_INIT and IKE_AUTH exchanges + and subsequent IKE exchanges CREATE_CHILD_SA or INFORMATIONAL + exchanges. In the common case, there is a single IKE_SA_INIT + exchange and a single IKE_AUTH exchange (a total of four messages) to + + + +Hoffman Expires July 5, 2006 [Page 5] + +Internet-Draft IKEv2 January 2006 + + + establish the IKE_SA and the first CHILD_SA. In exceptional cases, + there may be more than one of each of these exchanges. In all cases, + all IKE_SA_INIT exchanges MUST complete before any other exchange + type, then all IKE_AUTH exchanges MUST complete, and following that + any number of CREATE_CHILD_SA and INFORMATIONAL exchanges may occur + in any order. In some scenarios, only a single CHILD_SA is needed + between the IPsec endpoints, and therefore there would be no + additional exchanges. Subsequent exchanges MAY be used to establish + additional CHILD_SAs between the same authenticated pair of endpoints + and to perform housekeeping functions. + + IKE message flow always consists of a request followed by a response. + It is the responsibility of the requester to ensure reliability. If + the response is not received within a timeout interval, the requester + needs to retransmit the request (or abandon the connection). + + The first request/response of an IKE session (IKE_SA_INIT) negotiates + security parameters for the IKE_SA, sends nonces, and sends Diffie- + Hellman values. + + The second request/response (IKE_AUTH) transmits identities, proves + knowledge of the secrets corresponding to the two identities, and + sets up an SA for the first (and often only) AH and/or ESP CHILD_SA. + + The types of subsequent exchanges are CREATE_CHILD_SA (which creates + a CHILD_SA) and INFORMATIONAL (which deletes an SA, reports error + conditions, or does other housekeeping). Every request requires a + response. An INFORMATIONAL request with no payloads (other than the + empty Encrypted payload required by the syntax) is commonly used as a + check for liveness. These subsequent exchanges cannot be used until + the initial exchanges have completed. + + In the description that follows, we assume that no errors occur. + Modifications to the flow should errors occur are described in + Section 2.21. + +1.1. Usage Scenarios + + IKE is expected to be used to negotiate ESP and/or AH SAs in a number + of different scenarios, each with its own special requirements. + + + + + + + + + + + +Hoffman Expires July 5, 2006 [Page 6] + +Internet-Draft IKEv2 January 2006 + + +1.1.1. Security Gateway to Security Gateway Tunnel + + +-+-+-+-+-+ +-+-+-+-+-+ + ! ! IPsec ! ! + Protected !Tunnel ! tunnel !Tunnel ! Protected + Subnet <-->!Endpoint !<---------->!Endpoint !<--> Subnet + ! ! ! ! + +-+-+-+-+-+ +-+-+-+-+-+ + + Figure 1: Security Gateway to Security Gateway Tunnel + + In this scenario, neither endpoint of the IP connection implements + IPsec, but network nodes between them protect traffic for part of the + way. Protection is transparent to the endpoints, and depends on + ordinary routing to send packets through the tunnel endpoints for + processing. Each endpoint would announce the set of addresses + "behind" it, and packets would be sent in tunnel mode where the inner + IP header would contain the IP addresses of the actual endpoints. + +1.1.2. Endpoint-to-Endpoint Transport + + +-+-+-+-+-+ +-+-+-+-+-+ + ! ! IPsec transport ! ! + !Protected! or tunnel mode SA !Protected! + !Endpoint !<---------------------------------------->!Endpoint ! + ! ! ! ! + +-+-+-+-+-+ +-+-+-+-+-+ + + Figure 2: Endpoint to Endpoint + + In this scenario, both endpoints of the IP connection implement + IPsec, as required of hosts in [IPSECARCH]. Transport mode will + commonly be used with no inner IP header. If there is an inner IP + header, the inner addresses will be the same as the outer addresses. + A single pair of addresses will be negotiated for packets to be + protected by this SA. These endpoints MAY implement application + layer access controls based on the IPsec authenticated identities of + the participants. This scenario enables the end-to-end security that + has been a guiding principle for the Internet since [ARCHPRINC], + [TRANSPARENCY], and a method of limiting the inherent problems with + complexity in networks noted by [ARCHGUIDEPHIL]. Although this + scenario may not be fully applicable to the IPv4 Internet, it has + been deployed successfully in specific scenarios within intranets + using IKEv1. It should be more broadly enabled during the transition + to IPv6 and with the adoption of IKEv2. + + It is possible in this scenario that one or both of the protected + endpoints will be behind a network address translation (NAT) node, in + + + +Hoffman Expires July 5, 2006 [Page 7] + +Internet-Draft IKEv2 January 2006 + + + which case the tunneled packets will have to be UDP encapsulated so + that port numbers in the UDP headers can be used to identify + individual endpoints "behind" the NAT (see Section 2.23). + +1.1.3. Endpoint to Security Gateway Tunnel + + +-+-+-+-+-+ +-+-+-+-+-+ + ! ! IPsec ! ! Protected + !Protected! tunnel !Tunnel ! Subnet + !Endpoint !<------------------------>!Endpoint !<--- and/or + ! ! ! ! Internet + +-+-+-+-+-+ +-+-+-+-+-+ + + Figure 3: Endpoint to Security Gateway Tunnel + + In this scenario, a protected endpoint (typically a portable roaming + computer) connects back to its corporate network through an IPsec- + protected tunnel. It might use this tunnel only to access + information on the corporate network, or it might tunnel all of its + traffic back through the corporate network in order to take advantage + of protection provided by a corporate firewall against Internet-based + attacks. In either case, the protected endpoint will want an IP + address associated with the security gateway so that packets returned + to it will go to the security gateway and be tunneled back. This IP + address may be static or may be dynamically allocated by the security + gateway. {{ Clarif-6.1 }} In support of the latter case, IKEv2 + includes a mechanism (namely, configuration payloads) for the + initiator to request an IP address owned by the security gateway for + use for the duration of its SA. + + In this scenario, packets will use tunnel mode. On each packet from + the protected endpoint, the outer IP header will contain the source + IP address associated with its current location (i.e., the address + that will get traffic routed to the endpoint directly), while the + inner IP header will contain the source IP address assigned by the + security gateway (i.e., the address that will get traffic routed to + the security gateway for forwarding to the endpoint). The outer + destination address will always be that of the security gateway, + while the inner destination address will be the ultimate destination + for the packet. + + In this scenario, it is possible that the protected endpoint will be + behind a NAT. In that case, the IP address as seen by the security + gateway will not be the same as the IP address sent by the protected + endpoint, and packets will have to be UDP encapsulated in order to be + routed properly. + + + + + +Hoffman Expires July 5, 2006 [Page 8] + +Internet-Draft IKEv2 January 2006 + + +1.1.4. Other Scenarios + + Other scenarios are possible, as are nested combinations of the + above. One notable example combines aspects of 1.1.1 and 1.1.3. A + subnet may make all external accesses through a remote security + gateway using an IPsec tunnel, where the addresses on the subnet are + routed to the security gateway by the rest of the Internet. An + example would be someone's home network being virtually on the + Internet with static IP addresses even though connectivity is + provided by an ISP that assigns a single dynamically assigned IP + address to the user's security gateway (where the static IP addresses + and an IPsec relay are provided by a third party located elsewhere). + +1.2. The Initial Exchanges + + Communication using IKE always begins with IKE_SA_INIT and IKE_AUTH + exchanges (known in IKEv1 as Phase 1). These initial exchanges + normally consist of four messages, though in some scenarios that + number can grow. All communications using IKE consist of request/ + response pairs. We'll describe the base exchange first, followed by + variations. The first pair of messages (IKE_SA_INIT) negotiate + cryptographic algorithms, exchange nonces, and do a Diffie-Hellman + exchange [DH]. + + The second pair of messages (IKE_AUTH) authenticate the previous + messages, exchange identities and certificates, and establish the + first CHILD_SA. Parts of these messages are encrypted and integrity + protected with keys established through the IKE_SA_INIT exchange, so + the identities are hidden from eavesdroppers and all fields in all + the messages are authenticated. + + In the following descriptions, the payloads contained in the message + are indicated by names as listed below. + + + + + + + + + + + + + + + + + + +Hoffman Expires July 5, 2006 [Page 9] + +Internet-Draft IKEv2 January 2006 + + + Notation Payload + ----------------------------------------- + AUTH Authentication + CERT Certificate + CERTREQ Certificate Request + CP Configuration + D Delete + E Encrypted + EAP Extensible Authentication + HDR IKE Header + IDi Identification - Initiator + IDr Identification - Responder + KE Key Exchange + Ni, Nr Nonce + N Notify + SA Security Association + TSi Traffic Selector - Initiator + TSr Traffic Selector - Responder + V Vendor ID + + The details of the contents of each payload are described in section + 3. Payloads that may optionally appear will be shown in brackets, + such as [CERTREQ], indicate that optionally a certificate request + payload can be included. + + {{ Clarif-7.10 }} Many payloads contain fields marked as "RESERVED" + Some payloads in IKEv2 (and historically in IKEv1) are not aligned to + 4-byte boundaries. + + The initial exchanges are as follows: + + Initiator Responder + ------------------------------------------------------------------- + HDR, SAi1, KEi, Ni --> + + HDR contains the Security Parameter Indexes (SPIs), version numbers, + and flags of various sorts. The SAi1 payload states the + cryptographic algorithms the initiator supports for the IKE_SA. The + KE payload sends the initiator's Diffie-Hellman value. Ni is the + initiator's nonce. + + <-- HDR, SAr1, KEr, Nr, [CERTREQ] + + The responder chooses a cryptographic suite from the initiator's + offered choices and expresses that choice in the SAr1 payload, + completes the Diffie-Hellman exchange with the KEr payload, and sends + its nonce in the Nr payload. + + + + +Hoffman Expires July 5, 2006 [Page 10] + +Internet-Draft IKEv2 January 2006 + + + At this point in the negotiation, each party can generate SKEYSEED, + from which all keys are derived for that IKE_SA. All but the headers + of all the messages that follow are encrypted and integrity + protected. The keys used for the encryption and integrity protection + are derived from SKEYSEED and are known as SK_e (encryption) and SK_a + (authentication, a.k.a. integrity protection). A separate SK_e and + SK_a is computed for each direction. In addition to the keys SK_e + and SK_a derived from the DH value for protection of the IKE_SA, + another quantity SK_d is derived and used for derivation of further + keying material for CHILD_SAs. The notation SK { ... } indicates + that these payloads are encrypted and integrity protected using that + direction's SK_e and SK_a. + + HDR, SK {IDi, [CERT,] [CERTREQ,] + [IDr,] AUTH, SAi2, + TSi, TSr} --> + + The initiator asserts its identity with the IDi payload, proves + knowledge of the secret corresponding to IDi and integrity protects + the contents of the first message using the AUTH payload (see + Section 2.15). It might also send its certificate(s) in CERT + payload(s) and a list of its trust anchors in CERTREQ payload(s). If + any CERT payloads are included, the first certificate provided MUST + contain the public key used to verify the AUTH field. The optional + payload IDr enables the initiator to specify which of the responder's + identities it wants to talk to. This is useful when the machine on + which the responder is running is hosting multiple identities at the + same IP address. The initiator begins negotiation of a CHILD_SA + using the SAi2 payload. The final fields (starting with SAi2) are + described in the description of the CREATE_CHILD_SA exchange. + + <-- HDR, SK {IDr, [CERT,] AUTH, + SAr2, TSi, TSr} + + The responder asserts its identity with the IDr payload, optionally + sends one or more certificates (again with the certificate containing + the public key used to verify AUTH listed first), authenticates its + identity and protects the integrity of the second message with the + AUTH payload, and completes negotiation of a CHILD_SA with the + additional fields described below in the CREATE_CHILD_SA exchange. + + The recipients of messages 3 and 4 MUST verify that all signatures + and MACs are computed correctly and that the names in the ID payloads + correspond to the keys used to generate the AUTH payload. + + {{ Clarif-4.2}} If creating the CHILD_SA during the IKE_AUTH exchange + fails for some reason, the IKE_SA is still created as usual. The + list of responses in the IKE_AUTH exchange that do not prevent an + + + +Hoffman Expires July 5, 2006 [Page 11] + +Internet-Draft IKEv2 January 2006 + + + IKE_SA from being set up include at least the following: + NO_PROPOSAL_CHOSEN, TS_UNACCEPTABLE, SINGLE_PAIR_REQUIRED, + INTERNAL_ADDRESS_FAILURE, and FAILED_CP_REQUIRED. + + {{ Clarif-4.3 }} Note that IKE_AUTH messages do not contain KEi/KEr + or Ni/Nr payloads. Thus, the SA payload in IKE_AUTH exchange cannot + contain Transform Type 4 (Diffie-Hellman Group) with any other value + than NONE. Implementations MUST leave the transform out entirely in + this case. + +1.3. The CREATE_CHILD_SA Exchange + + {{ This is a heavy rewrite of most of this section. The major + organization changes are described in Clarif-4.1 and Clarif-5.1. }} + + The CREATE_CHILD_SA exchange is used to create new CHILD_SAs and to + rekey both IKE_SAs and CHILD_SAs. This exchange consists of a single + request/response pair, and some of its function was referred to as a + phase 2 exchange in IKEv1. It MAY be initiated by either end of the + IKE_SA after the initial exchanges are completed. + + All messages following the initial exchange are cryptographically + protected using the cryptographic algorithms and keys negotiated in + the first two messages of the IKE exchange. These subsequent + messages use the syntax of the Encrypted Payload described in + Section 3.14. All subsequent messages included an Encrypted Payload, + even if they are referred to in the text as "empty". For both + messages in the CREATE_CHILD_SA, the message following the header is + encrypted and the message including the header is integrity protected + using the cryptographic algorithms negotiated for the IKE_SA. + + The CREATE_CHILD_SA is used for rekeying IKE_SAs and CHILD_SAs. This + section describes the first part of rekeying, the creation of new + SAs; Section 2.8 covers the mechanics of rekeying, including moving + traffic from old to new SAs and the deletion of the old SAs. The two + sections must be read together to understand the entire process of + rekeying. + + Either endpoint may initiate a CREATE_CHILD_SA exchange, so in this + section the term initiator refers to the endpoint initiating this + exchange. An implementation MAY refuse all CREATE_CHILD_SA requests + within an IKE_SA. + + The CREATE_CHILD_SA request MAY optionally contain a KE payload for + an additional Diffie-Hellman exchange to enable stronger guarantees + of forward secrecy for the CHILD_SA. The keying material for the + CHILD_SA is a function of SK_d established during the establishment + of the IKE_SA, the nonces exchanged during the CREATE_CHILD_SA + + + +Hoffman Expires July 5, 2006 [Page 12] + +Internet-Draft IKEv2 January 2006 + + + exchange, and the Diffie-Hellman value (if KE payloads are included + in the CREATE_CHILD_SA exchange). + + If a CREATE_CHILD_SA exchange includes a KEi payload, at least one of + the SA offers MUST include the Diffie-Hellman group of the KEi. The + Diffie-Hellman group of the KEi MUST be an element of the group the + initiator expects the responder to accept (additional Diffie-Hellman + groups can be proposed). If the responder rejects the Diffie-Hellman + group of the KEi payload, the responder MUST reject the request and + indicate its preferred Diffie-Hellman group in the INVALID_KE_PAYLOAD + Notification payload. In the case of such a rejection, the + CREATE_CHILD_SA exchange fails, and the initiator will probably retry + the exchange with a Diffie-Hellman proposal and KEi in the group that + the responder gave in the INVALID_KE_PAYLOAD. + +1.3.1. Creating New CHILD_SAs with the CREATE_CHILD_SA Exchange + + A CHILD_SA may be created by sending a CREATE_CHILD_SA request. The + CREATE_CHILD_SA request for creating a new CHILD_SA is: + + Initiator Responder + ------------------------------------------------------------------- + HDR, SK {SA, Ni, [KEi], + TSi, TSr} --> + + The initiator sends SA offer(s) in the SA payload, a nonce in the Ni + payload, optionally a Diffie-Hellman value in the KEi payload, and + the proposed traffic selectors for the proposed CHILD_SA in the TSi + and TSr payloads. + + The CREATE_CHILD_SA response for creating a new CHILD_SA is: + + <-- HDR, SK {SA, Nr, [KEr], + TSi, TSr} + + The responder replies (using the same Message ID to respond) with the + accepted offer in an SA payload, and a Diffie-Hellman value in the + KEr payload if KEi was included in the request and the selected + cryptographic suite includes that group. + + The traffic selectors for traffic to be sent on that SA are specified + in the TS payloads in the response, which may be a subset of what the + initiator of the CHILD_SA proposed. + +1.3.2. Rekeying IKE_SAs with the CREATE_CHILD_SA Exchange + + The CREATE_CHILD_SA request for rekeying an IKE_SA is: + + + + +Hoffman Expires July 5, 2006 [Page 13] + +Internet-Draft IKEv2 January 2006 + + + Initiator Responder + ------------------------------------------------------------------- + HDR, SK {SA, Ni, KEi} --> + + The initiator sends SA offer(s) in the SA payload, a nonce in the Ni + payload, and a Diffie-Hellman value in the KEi payload. New + initiator and responder SPIs are supplied in the SPI fields. + + The CREATE_CHILD_SA response for rekeying an IKE_SA is: + + <-- HDR, SK {SA, Nr, KEr} + + The responder replies (using the same Message ID to respond) with the + accepted offer in an SA payload, and a Diffie-Hellman value in the + KEr payload if the selected cryptographic suite includes that group. + + The new IKE_SA has its message counters set to 0, regardless of what + they were in the earlier IKE_SA. The window size starts at 1 for any + new IKE_SA. + + KEi and KEr are required for rekeying an IKE_SA. + +1.3.3. Rekeying CHILD_SAs with the CREATE_CHILD_SA Exchange + + The CREATE_CHILD_SA request for rekeying a CHILD_SA is: + + Initiator Responder + ------------------------------------------------------------------- + HDR, SK {N, SA, Ni, [KEi], + TSi, TSr} --> + + The initiator sends SA offer(s) in the SA payload, a nonce in the Ni + payload, optionally a Diffie-Hellman value in the KEi payload, and + the proposed traffic selectors for the proposed CHILD_SA in the TSi + and TSr payloads. When rekeying an existing CHILD_SA, the leading N + payload of type REKEY_SA MUST be included and MUST give the SPI (as + they would be expected in the headers of inbound packets) of the SAs + being rekeyed. + + The CREATE_CHILD_SA response for rekeying a CHILD_SA is: + + <-- HDR, SK {SA, Nr, [KEr], + Si, TSr} + + The responder replies (using the same Message ID to respond) with the + accepted offer in an SA payload, and a Diffie-Hellman value in the + KEr payload if KEi was included in the request and the selected + cryptographic suite includes that group. + + + +Hoffman Expires July 5, 2006 [Page 14] + +Internet-Draft IKEv2 January 2006 + + + The traffic selectors for traffic to be sent on that SA are specified + in the TS payloads in the response, which may be a subset of what the + initiator of the CHILD_SA proposed. + +1.4. The INFORMATIONAL Exchange + + At various points during the operation of an IKE_SA, peers may desire + to convey control messages to each other regarding errors or + notifications of certain events. To accomplish this, IKE defines an + INFORMATIONAL exchange. INFORMATIONAL exchanges MUST ONLY occur + after the initial exchanges and are cryptographically protected with + the negotiated keys. + + Control messages that pertain to an IKE_SA MUST be sent under that + IKE_SA. Control messages that pertain to CHILD_SAs MUST be sent + under the protection of the IKE_SA which generated them (or its + successor if the IKE_SA was replaced for the purpose of rekeying). + + Messages in an INFORMATIONAL exchange contain zero or more + Notification, Delete, and Configuration payloads. The Recipient of + an INFORMATIONAL exchange request MUST send some response (else the + Sender will assume the message was lost in the network and will + retransmit it). That response MAY be a message with no payloads. + The request message in an INFORMATIONAL exchange MAY also contain no + payloads. This is the expected way an endpoint can ask the other + endpoint to verify that it is alive. + + {{ Clarif-5.6 }} ESP and AH SAs always exist in pairs, with one SA in + each direction. When an SA is closed, both members of the pair MUST + be closed (that is, deleted). When SAs are nested, as when data (and + IP headers if in tunnel mode) are encapsulated first with IPComp, + then with ESP, and finally with AH between the same pair of + endpoints, all of the SAs MUST be deleted together. Each endpoint + MUST close its incoming SAs and allow the other endpoint to close the + other SA in each pair. To delete an SA, an INFORMATIONAL exchange + with one or more delete payloads is sent listing the SPIs (as they + would be expected in the headers of inbound packets) of the SAs to be + deleted. The recipient MUST close the designated SAs. {{ Clarif-5.7 + }} Note that you never send delete payloads for the two sides of an + SA in a single message. If you have many SAs to delete at the same + time (such as for nested SAs), you include delete payloads for in + inbound half of each SA in your Informational exchange. + + Normally, the reply in the INFORMATIONAL exchange will contain delete + payloads for the paired SAs going in the other direction. There is + one exception. If by chance both ends of a set of SAs independently + decide to close them, each may send a delete payload and the two + requests may cross in the network. If a node receives a delete + + + +Hoffman Expires July 5, 2006 [Page 15] + +Internet-Draft IKEv2 January 2006 + + + request for SAs for which it has already issued a delete request, it + MUST delete the outgoing SAs while processing the request and the + incoming SAs while processing the response. In that case, the + responses MUST NOT include delete payloads for the deleted SAs, since + that would result in duplicate deletion and could in theory delete + the wrong SA. + + {{ Demoted the SHOULD }} Half-closed connections are anomalous and, + and a node with auditing capability will probably audit their + existence if they persist. Note that this specification nowhere + specifies time periods, so it is up to individual endpoints to decide + how long to wait. A node MAY refuse to accept incoming data on half- + closed connections but MUST NOT unilaterally close them and reuse the + SPIs. If connection state becomes sufficiently messed up, a node MAY + close the IKE_SA; doing so will implicitly close all SAs negotiated + under it. It can then rebuild the SAs it needs on a clean base under + a new IKE_SA. {{ Clarif-5.8 }} The response to a request that deletes + the IKE_SA is an empty Informational response. + + The INFORMATIONAL exchange is defined as: + + Initiator Responder + ------------------------------------------------------------------- + HDR, SK {[N,] [D,] + [CP,] ...} --> + <-- HDR, SK {[N,] [D,] + [CP], ...} + + The processing of an INFORMATIONAL exchange is determined by its + component payloads. + +1.5. Informational Messages outside of an IKE_SA + + If an encrypted IKE packet arrives on port 500 or 4500 with an + unrecognized SPI, it could be because the receiving node has recently + crashed and lost state or because of some other system malfunction or + attack. If the receiving node has an active IKE_SA to the IP address + from whence the packet came, it MAY send a notification of the + wayward packet over that IKE_SA in an INFORMATIONAL exchange. If it + does not have such an IKE_SA, it MAY send an Informational message + without cryptographic protection to the source IP address. Such a + message is not part of an informational exchange, and the receiving + node MUST NOT respond to it. Doing so could cause a message loop. + + {{ Clarif-7.7 }} There are two cases when such a one-way notification + is sent: INVALID_IKE_SPI and INVALID_SPI. These notifications are + sent outside of an IKE_SA. Note that such notifications are + explicitly not Informational exchanges; these are one-way messages + + + +Hoffman Expires July 5, 2006 [Page 16] + +Internet-Draft IKEv2 January 2006 + + + that must not be responded to. In case of INVALID_IKE_SPI, the + message sent is a response message, and thus it is sent to the IP + address and port from whence it came with the same IKE SPIs and the + Message ID copied. In case of INVALID_SPI, however, there are no IKE + SPI values that would be meaningful to the recipient of such a + notification. Using zero values or random values are both + acceptable. + +1.6. Requirements Terminology + + Keywords "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT" and + "MAY" that appear in this document are to be interpreted as described + in [MUSTSHOULD]. + + The term "Expert Review" is to be interpreted as defined in + [IANACONS]. + +1.7. Introduction to IKEv2.1 + + IKEv2.1 is very similar to IKEv2. Most of the differences between + this document at [IKEV2] are clarifications, mostly based on + [Clarif]. The changes listed in that document were discussed in the + IPsec Working Group and, after the Working Group was disbanded, on + the IPsec mailing list. That document contains detailed explanations + of areas that were unclear in IKEv2, and is thus useful to + implementers of IKEv2 and IKEv2.1. + + In the body of this document, notes that are enclosed in double curly + braces {{ such as this }} point out changes from IKEv2. Changes that + come from [Clarif] are marked with the section from that document, + such as "{{ Clarif-2.10 }}". + + This document also make the figures and references a bit more regular + than in IKEv2. + + IKEv2 developers have noted that the SHOULD-level requirements are + often unclear in that they don't say when it is OK to not obey the + requirements. They also have noted that there are MUST-level + requirements that are not related to interoperability. This document + has more explanation of some of these SHOULD-level requirements, and + some SHOULD-level and MUST-level requirements have been changed to + better match the definitions in [MUSTSHOULD]. All non-capitalized + uses of the words SHOULD and MUST now mean their normal English + sense, not the interoperability sense of [MUSTSHOULD]. + + IKEv2 (and IKEv1) developers have noted that there is a great deal of + material in the tables of codes in Section 3.10. This leads to + implementers not having all the needed information in the main body + + + +Hoffman Expires July 5, 2006 [Page 17] + +Internet-Draft IKEv2 January 2006 + + + of the docment. A later version of this document may move much of + the material from those tables into the associated parts of the main + body of the document. + + A later version of this document will probably have all the {{ }} + comments removed from the body of the document and instead appear in + an appendix. + + +2. IKE Protocol Details and Variations + + IKE normally listens and sends on UDP port 500, though IKE messages + may also be received on UDP port 4500 with a slightly different + format (see Section 2.23). Since UDP is a datagram (unreliable) + protocol, IKE includes in its definition recovery from transmission + errors, including packet loss, packet replay, and packet forgery. + IKE is designed to function so long as (1) at least one of a series + of retransmitted packets reaches its destination before timing out; + and (2) the channel is not so full of forged and replayed packets so + as to exhaust the network or CPU capacities of either endpoint. Even + in the absence of those minimum performance requirements, IKE is + designed to fail cleanly (as though the network were broken). + + Although IKEv2 messages are intended to be short, they contain + structures with no hard upper bound on size (in particular, X.509 + certificates), and IKEv2 itself does not have a mechanism for + fragmenting large messages. IP defines a mechanism for fragmentation + of oversize UDP messages, but implementations vary in the maximum + message size supported. Furthermore, use of IP fragmentation opens + an implementation to denial of service attacks [DOSUDPPROT]. + Finally, some NAT and/or firewall implementations may block IP + fragments. + + All IKEv2 implementations MUST be able to send, receive, and process + IKE messages that are up to 1280 bytes long, and they SHOULD be able + to send, receive, and process messages that are up to 3000 bytes + long. {{ Demoted the SHOULD }} IKEv2 implementations need to be aware + of the maximum UDP message size supported and MAY shorten messages by + leaving out some certificates or cryptographic suite proposals if + that will keep messages below the maximum. Use of the "Hash and URL" + formats rather than including certificates in exchanges where + possible can avoid most problems. {{ Demoted the SHOULD }} + Implementations and configuration need to keep in mind, however, that + if the URL lookups are possible only after the IPsec SA is + established, recursion issues could prevent this technique from + working. + + + + + +Hoffman Expires July 5, 2006 [Page 18] + +Internet-Draft IKEv2 January 2006 + + +2.1. Use of Retransmission Timers + + All messages in IKE exist in pairs: a request and a response. The + setup of an IKE_SA normally consists of two request/response pairs. + Once the IKE_SA is set up, either end of the security association may + initiate requests at any time, and there can be many requests and + responses "in flight" at any given moment. But each message is + labeled as either a request or a response, and for each request/ + response pair one end of the security association is the initiator + and the other is the responder. + + For every pair of IKE messages, the initiator is responsible for + retransmission in the event of a timeout. The responder MUST never + retransmit a response unless it receives a retransmission of the + request. In that event, the responder MUST ignore the retransmitted + request except insofar as it triggers a retransmission of the + response. The initiator MUST remember each request until it receives + the corresponding response. The responder MUST remember each + response until it receives a request whose sequence number is larger + than the sequence number in the response plus its window size (see + Section 2.3). + + IKE is a reliable protocol, in the sense that the initiator MUST + retransmit a request until either it receives a corresponding reply + OR it deems the IKE security association to have failed and it + discards all state associated with the IKE_SA and any CHILD_SAs + negotiated using that IKE_SA. + + {{ Clarif-7.5 }} All packets sent on port 4500 MUST begin with the + prefix of four zeros; otherwise, the receiver won't know how to + handle them. + +2.2. Use of Sequence Numbers for Message ID + + Every IKE message contains a Message ID as part of its fixed header. + This Message ID is used to match up requests and responses, and to + identify retransmissions of messages. + + The Message ID is a 32-bit quantity, which is zero for the first IKE + request in each direction. {{ Clarif-3.11 }} When the IKE_AUTH + exchange does not use EAP, the IKE_SA initial setup messages will + always be numbered 0 and 1. When EAP is used, each pair of messages + have their message numbers incremented; the first pair of AUTH + messages will have an ID of 1, the second will be 2, and so on. + + Each endpoint in the IKE Security Association maintains two "current" + Message IDs: the next one to be used for a request it initiates and + the next one it expects to see in a request from the other end. + + + +Hoffman Expires July 5, 2006 [Page 19] + +Internet-Draft IKEv2 January 2006 + + + These counters increment as requests are generated and received. + Responses always contain the same message ID as the corresponding + request. That means that after the initial exchange, each integer n + may appear as the message ID in four distinct messages: the nth + request from the original IKE initiator, the corresponding response, + the nth request from the original IKE responder, and the + corresponding response. If the two ends make very different numbers + of requests, the Message IDs in the two directions can be very + different. There is no ambiguity in the messages, however, because + the (I)nitiator and (R)esponse bits in the message header specify + which of the four messages a particular one is. + + {{ Clarif-2.2 }} The Message ID for IKE_SA_INIT messages is always + zero, including for retries of the message due to responses such as + COOKIE and INVALID_KE_PAYLOAD. + + Note that Message IDs are cryptographically protected and provide + protection against message replays. In the unlikely event that + Message IDs grow too large to fit in 32 bits, the IKE_SA MUST be + closed. Rekeying an IKE_SA resets the sequence numbers. + + {{ Clarif-2.3 }} When a responder receives an IKE_SA_INIT request, it + has to determine whether the packet is a retransmission belonging to + an existing "half-open" IKE_SA (in which case the responder + retransmits the same response), or a new request (in which case the + responder creates a new IKE_SA and sends a fresh response). It is + not sufficient to use the initiator's SPI and/or IP address to + differentiate between the two cases because two different peers + behind a single NAT could choose the same initiator SPI. Instead, a + robust responder will do the IKE_SA lookup using the whole packet, + its hash, or the Ni payload. + +2.3. Window Size for Overlapping Requests + + In order to maximize IKE throughput, an IKE endpoint MAY issue + multiple requests before getting a response to any of them if the + other endpoint has indicated its ability to handle such requests. + For simplicity, an IKE implementation MAY choose to process requests + strictly in order and/or wait for a response to one request before + issuing another. Certain rules must be followed to ensure + interoperability between implementations using different strategies. + + After an IKE_SA is set up, either end can initiate one or more + requests. These requests may pass one another over the network. An + IKE endpoint MUST be prepared to accept and process a request while + it has a request outstanding in order to avoid a deadlock in this + situation. {{ Changed the SHOULD to MUST }} An IKE endpoint MUST be + prepared to accept and process multiple requests while it has a + + + +Hoffman Expires July 5, 2006 [Page 20] + +Internet-Draft IKEv2 January 2006 + + + request outstanding. + + An IKE endpoint MUST wait for a response to each of its messages + before sending a subsequent message unless it has received a + SET_WINDOW_SIZE Notify message from its peer informing it that the + peer is prepared to maintain state for multiple outstanding messages + in order to allow greater throughput. + + An IKE endpoint MUST NOT exceed the peer's stated window size for + transmitted IKE requests. In other words, if the responder stated + its window size is N, then when the initiator needs to make a request + X, it MUST wait until it has received responses to all requests up + through request X-N. An IKE endpoint MUST keep a copy of (or be able + to regenerate exactly) each request it has sent until it receives the + corresponding response. An IKE endpoint MUST keep a copy of (or be + able to regenerate exactly) the number of previous responses equal to + its declared window size in case its response was lost and the + initiator requests its retransmission by retransmitting the request. + + An IKE endpoint supporting a window size greater than one should be + capable of processing incoming requests out of order to maximize + performance in the event of network failures or packet reordering. + + {{ Clarif-7.3 }} The window size is assumed to be a (possibly + configurable) property of a particular implementation, and is not + related to congestion control (unlike the window size in TCP, for + example). In particular, it is not defined what the responder should + do when it receives a SET_WINDOW_SIZE notification containing a + smaller value than is currently in effect. Thus, there is currently + no way to reduce the window size of an existing IKE_SA; you can only + increase it. When rekeying an IKE_SA, the new IKE_SA starts with + window size 1 until it is explicitly increased by sending a new + SET_WINDOW_SIZE notification. + +2.4. State Synchronization and Connection Timeouts + + An IKE endpoint is allowed to forget all of its state associated with + an IKE_SA and the collection of corresponding CHILD_SAs at any time. + This is the anticipated behavior in the event of an endpoint crash + and restart. It is important when an endpoint either fails or + reinitializes its state that the other endpoint detect those + conditions and not continue to waste network bandwidth by sending + packets over discarded SAs and having them fall into a black hole. + + Since IKE is designed to operate in spite of Denial of Service (DoS) + attacks from the network, an endpoint MUST NOT conclude that the + other endpoint has failed based on any routing information (e.g., + ICMP messages) or IKE messages that arrive without cryptographic + + + +Hoffman Expires July 5, 2006 [Page 21] + +Internet-Draft IKEv2 January 2006 + + + protection (e.g., Notify messages complaining about unknown SPIs). + An endpoint MUST conclude that the other endpoint has failed only + when repeated attempts to contact it have gone unanswered for a + timeout period or when a cryptographically protected INITIAL_CONTACT + notification is received on a different IKE_SA to the same + authenticated identity. {{ Demoted the SHOULD }} An endpoint should + suspect that the other endpoint has failed based on routing + information and initiate a request to see whether the other endpoint + is alive. To check whether the other side is alive, IKE specifies an + empty INFORMATIONAL message that (like all IKE requests) requires an + acknowledgement (note that within the context of an IKE_SA, an + "empty" message consists of an IKE header followed by an Encrypted + payload that contains no payloads). If a cryptographically protected + message has been received from the other side recently, unprotected + notifications MAY be ignored. Implementations MUST limit the rate at + which they take actions based on unprotected messages. + + Numbers of retries and lengths of timeouts are not covered in this + specification because they do not affect interoperability. It is + suggested that messages be retransmitted at least a dozen times over + a period of at least several minutes before giving up on an SA, but + different environments may require different rules. To be a good + network citizen, retranmission times MUST increase exponentially to + avoid flooding the network and making an existing congestion + situation worse. If there has only been outgoing traffic on all of + the SAs associated with an IKE_SA, it is essential to confirm + liveness of the other endpoint to avoid black holes. If no + cryptographically protected messages have been received on an IKE_SA + or any of its CHILD_SAs recently, the system needs to perform a + liveness check in order to prevent sending messages to a dead peer. + Receipt of a fresh cryptographically protected message on an IKE_SA + or any of its CHILD_SAs ensures liveness of the IKE_SA and all of its + CHILD_SAs. Note that this places requirements on the failure modes + of an IKE endpoint. An implementation MUST NOT continue sending on + any SA if some failure prevents it from receiving on all of the + associated SAs. If CHILD_SAs can fail independently from one another + without the associated IKE_SA being able to send a delete message, + then they MUST be negotiated by separate IKE_SAs. + + There is a Denial of Service attack on the initiator of an IKE_SA + that can be avoided if the initiator takes the proper care. Since + the first two messages of an SA setup are not cryptographically + protected, an attacker could respond to the initiator's message + before the genuine responder and poison the connection setup attempt. + To prevent this, the initiator MAY be willing to accept multiple + responses to its first message, treat each as potentially legitimate, + respond to it, and then discard all the invalid half-open connections + when it receives a valid cryptographically protected response to any + + + +Hoffman Expires July 5, 2006 [Page 22] + +Internet-Draft IKEv2 January 2006 + + + one of its requests. Once a cryptographically valid response is + received, all subsequent responses should be ignored whether or not + they are cryptographically valid. + + Note that with these rules, there is no reason to negotiate and agree + upon an SA lifetime. If IKE presumes the partner is dead, based on + repeated lack of acknowledgement to an IKE message, then the IKE SA + and all CHILD_SAs set up through that IKE_SA are deleted. + + An IKE endpoint may at any time delete inactive CHILD_SAs to recover + resources used to hold their state. If an IKE endpoint chooses to + delete CHILD_SAs, it MUST send Delete payloads to the other end + notifying it of the deletion. It MAY similarly time out the IKE_SA. + {{ Clarified the SHOULD }} Closing the IKE_SA implicitly closes all + associated CHILD_SAs. In this case, an IKE endpoint SHOULD send a + Delete payload indicating that it has closed the IKE_SA unless the + other endpoint is no longer responding. + +2.5. Version Numbers and Forward Compatibility + + {{ The version number is changed in the following paragraph, and the + discussion of handling of multiple versions is also changed + throughout the section. }} + + This document describes version 2.1 of IKE, meaning the major version + number is 2 and the minor version number is 1. It is likely that + some implementations will want to support version 1.0 and version 2.0 + and version 2.1, and in the future, other versions. + + The major version number should be incremented only if the packet + formats or required actions have changed so dramatically that an + older version node would not be able to interoperate with a newer + version node if it simply ignored the fields it did not understand + and took the actions specified in the older specification. The minor + version number indicates new capabilities, and MUST be ignored by a + node with a smaller minor version number, but used for informational + purposes by the node with the larger minor version number. For + example, it might indicate the ability to process a newly defined + notification message. The node with the larger minor version number + would simply note that its correspondent would not be able to + understand that message and therefore would not send it. + + In the discussion of clarifications to IKEv2, it became clear that + there was a need for additional "MUST" and "SHOULD" requirements. + Some of those changes are reflected in IKEv2.1. Thus, the node with + the higher version number may also need to note that its + correspondent may not be following the same required actions, which + could affect interoperability. + + + +Hoffman Expires July 5, 2006 [Page 23] + +Internet-Draft IKEv2 January 2006 + + + {{ Promoted the SHOULD }} If an endpoint receives a message with a + higher major version number, it MUST drop the message and MUST send + an unauthenticated notification message containing the highest + version number it supports. If an endpoint supports major version n, + and major version m, it MUST support all versions between n and m. + If it receives a message with a major version that it supports, it + MUST respond with that version number. In order to prevent two nodes + from being tricked into corresponding with a lower major version + number than the maximum that they both support, IKE has a flag that + indicates that the node is capable of speaking a higher major version + number. + + Thus, the major version number in the IKE header indicates the + version number of the message, not the highest version number that + the transmitter supports. If the initiator is capable of speaking + versions n, n+1, and n+2, and the responder is capable of speaking + versions n and n+1, then they will negotiate speaking n+1, where the + initiator will set the flag indicating its ability to speak a higher + version. If they mistakenly (perhaps through an active attacker + sending error messages) negotiate to version n, then both will notice + that the other side can support a higher version number, and they + MUST break the connection and reconnect using version n+1. + + Note that IKEv1 does not follow these rules, because there is no way + in v1 of noting that you are capable of speaking a higher version + number. So an active attacker can trick two v2-capable nodes into + speaking v1. {{ Demoted the SHOULD }} When a v2-capable node + negotiates down to v1, it should note that fact in its logs. + + Also for forward compatibility, all fields marked RESERVED MUST be + set to zero by an implementation running version 2.0 or later, and + their content MUST be ignored by an implementation running version + 2.0 or later ("Be conservative in what you send and liberal in what + you receive"). In this way, future versions of the protocol can use + those fields in a way that is guaranteed to be ignored by + implementations that do not understand them. Similarly, payload + types that are not defined are reserved for future use; + implementations of a version where they are undefined MUST skip over + those payloads and ignore their contents. + + IKEv2 adds a "critical" flag to each payload header for further + flexibility for forward compatibility. If the critical flag is set + and the payload type is unrecognized, the message MUST be rejected + and the response to the IKE request containing that payload MUST + include a Notify payload UNSUPPORTED_CRITICAL_PAYLOAD, indicating an + unsupported critical payload was included. If the critical flag is + not set and the payload type is unsupported, that payload MUST be + ignored. + + + +Hoffman Expires July 5, 2006 [Page 24] + +Internet-Draft IKEv2 January 2006 + + + {{ Demoted the SHOULD }}Although new payload types may be added in + the future and may appear interleaved with the fields defined in this + specification, implementations MUST send the payloads defined in this + specification in the order shown in the figures in Section 2 and + implementations MAY reject as invalid a message with those payloads + in any other order. + +2.6. Cookies + + The term "cookies" originates with Karn and Simpson [PHOTURIS] in + Photuris, an early proposal for key management with IPsec, and it has + persisted. The Internet Security Association and Key Management + Protocol (ISAKMP) [ISAKMP] fixed message header includes two eight- + octet fields titled "cookies", and that syntax is used by both IKEv1 + and IKEv2 though in IKEv2 they are referred to as the IKE SPI and + there is a new separate field in a Notify payload holding the cookie. + The initial two eight-octet fields in the header are used as a + connection identifier at the beginning of IKE packets. {{ Promoted + the SHOULD }} Each endpoint chooses one of the two SPIs and MUST + choose them so as to be unique identifiers of an IKE_SA. An SPI + value of zero is special and indicates that the remote SPI value is + not yet known by the sender. + + Unlike ESP and AH where only the recipient's SPI appears in the + header of a message, in IKE the sender's SPI is also sent in every + message. Since the SPI chosen by the original initiator of the + IKE_SA is always sent first, an endpoint with multiple IKE_SAs open + that wants to find the appropriate IKE_SA using the SPI it assigned + must look at the I(nitiator) Flag bit in the header to determine + whether it assigned the first or the second eight octets. + + In the first message of an initial IKE exchange, the initiator will + not know the responder's SPI value and will therefore set that field + to zero. + + An expected attack against IKE is state and CPU exhaustion, where the + target is flooded with session initiation requests from forged IP + addresses. This attack can be made less effective if an + implementation of a responder uses minimal CPU and commits no state + to an SA until it knows the initiator can receive packets at the + address from which it claims to be sending them. To accomplish this, + a responder SHOULD -- when it detects a large number of half-open + IKE_SAs -- reject initial IKE messages unless they contain a Notify + payload of type COOKIE. {{ Clarified the SHOULD }} If the responder + wants to set up an SA, it SHOULD instead send an unprotected IKE + message as a response and include COOKIE Notify payload with the + cookie data to be returned. Initiators who receive such responses + MUST retry the IKE_SA_INIT with a Notify payload of type COOKIE + + + +Hoffman Expires July 5, 2006 [Page 25] + +Internet-Draft IKEv2 January 2006 + + + containing the responder supplied cookie data as the first payload + and all other payloads unchanged. The initial exchange will then be + as follows: + + Initiator Responder + ------------------------------------------------------------------- + HDR(A,0), SAi1, KEi, Ni --> + <-- HDR(A,0), N(COOKIE) + HDR(A,0), N(COOKIE), SAi1, + KEi, Ni --> + <-- HDR(A,B), SAr1, KEr, + Nr, [CERTREQ] + HDR(A,B), SK {IDi, [CERT,] + [CERTREQ,] [IDr,] AUTH, + SAi2, TSi, TSr} --> + <-- HDR(A,B), SK {IDr, [CERT,] + AUTH, SAr2, TSi, TSr} + + The first two messages do not affect any initiator or responder state + except for communicating the cookie. In particular, the message + sequence numbers in the first four messages will all be zero and the + message sequence numbers in the last two messages will be one. 'A' + is the SPI assigned by the initiator, while 'B' is the SPI assigned + by the responder. + + {{ Clarif-2.1 }} Because the responder's SPI identifies security- + related state held by the responder, and in this case no state is + created, the responder sends a zero value for the responder's SPI. + + {{ Demoted the SHOULD }} An IKE implementation should implement its + responder cookie generation in such a way as to not require any saved + state to recognize its valid cookie when the second IKE_SA_INIT + message arrives. The exact algorithms and syntax they use to + generate cookies do not affect interoperability and hence are not + specified here. The following is an example of how an endpoint could + use cookies to implement limited DOS protection. + + A good way to do this is to set the responder cookie to be: + + Cookie = <VersionIDofSecret> | Hash(Ni | IPi | SPIi | <secret>) + + where <secret> is a randomly generated secret known only to the + responder and periodically changed and | indicates concatenation. + <VersionIDofSecret> should be changed whenever <secret> is + regenerated. The cookie can be recomputed when the IKE_SA_INIT + arrives the second time and compared to the cookie in the received + message. If it matches, the responder knows that the cookie was + generated since the last change to <secret> and that IPi must be the + + + +Hoffman Expires July 5, 2006 [Page 26] + +Internet-Draft IKEv2 January 2006 + + + same as the source address it saw the first time. Incorporating SPIi + into the calculation ensures that if multiple IKE_SAs are being set + up in parallel they will all get different cookies (assuming the + initiator chooses unique SPIi's). Incorporating Ni into the hash + ensures that an attacker who sees only message 2 can't successfully + forge a message 3. + + If a new value for <secret> is chosen while there are connections in + the process of being initialized, an IKE_SA_INIT might be returned + with other than the current <VersionIDofSecret>. The responder in + that case MAY reject the message by sending another response with a + new cookie or it MAY keep the old value of <secret> around for a + short time and accept cookies computed from either one. {{ Demoted + the SHOULD NOT }} The responder should not accept cookies + indefinitely after <secret> is changed, since that would defeat part + of the denial of service protection. {{ Demoted the SHOULD }} The + responder should change the value of <secret> frequently, especially + if under attack. + + {{ Clarif-2.1 }} In addition to cookies, there are several cases + where the IKE_SA_INIT exchange does not result in the creation of an + IKE_SA (such as INVALID_KE_PAYLOAD or NO_PROPOSAL_CHOSEN). In such a + case, sending a zero value for the Responder's SPI is correct. If + the responder sends a non-zero responder SPI, the initiator should + not reject the response for only that reason. + + {{ Clarif-2.5 }} When one party receives an IKE_SA_INIT request + containing a cookie whose contents do not match the value expected, + that party MUST ignore the cookie and process the message as if no + cookie had been included; usually this means sending a response + containing a new cookie. + +2.6.1. Interaction of COOKIE and INVALID_KE_PAYLOAD + + {{ This section added by Clarif-2.4 }} + + There are two common reasons why the initiator may have to retry the + IKE_SA_INIT exchange: the responder requests a cookie or wants a + different Diffie-Hellman group than was included in the KEi payload. + If the initiator receives a cookie from the responder, the initiator + needs to decide whether or not tp include the cookie in only the next + retry of the IKE_SA_INIT request, or in all subsequent retries as + well. + + If the initiator includes the cookie only in the next retry, one + additional roundtrip may be needed in some cases. An additional + roundtrip is needed also if the initiator includes the cookie in all + retries, but the responder does not support this. For instance, if + + + +Hoffman Expires July 5, 2006 [Page 27] + +Internet-Draft IKEv2 January 2006 + + + the responder includes the SAi1 and KEi payloads in cookie + calculation, it will reject the request by sending a new cookie. + + If both peers support including the cookie in all retries, a slightly + shorter exchange can happen. Implementations MUST support this + shorter exchange, but MUST NOT assume other implementations also + supports this shorter exchange. + +2.7. Cryptographic Algorithm Negotiation + + The payload type known as "SA" indicates a proposal for a set of + choices of IPsec protocols (IKE, ESP, and/or AH) for the SA as well + as cryptographic algorithms associated with each protocol. + + An SA payload consists of one or more proposals. Each proposal + includes one or more protocols (usually one). Each protocol contains + one or more transforms -- each specifying a cryptographic algorithm. + Each transform contains zero or more attributes (attributes are + needed only if the transform identifier does not completely specify + the cryptographic algorithm). + + This hierarchical structure was designed to efficiently encode + proposals for cryptographic suites when the number of supported + suites is large because multiple values are acceptable for multiple + transforms. The responder MUST choose a single suite, which MAY be + any subset of the SA proposal following the rules below: + + Each proposal contains one or more protocols. If a proposal is + accepted, the SA response MUST contain the same protocols in the same + order as the proposal. The responder MUST accept a single proposal + or reject them all and return an error. (Example: if a single + proposal contains ESP and AH and that proposal is accepted, both ESP + and AH MUST be accepted. If ESP and AH are included in separate + proposals, the responder MUST accept only one of them). + + Each IPsec protocol proposal contains one or more transforms. Each + transform contains a transform type. The accepted cryptographic + suite MUST contain exactly one transform of each type included in the + proposal. For example: if an ESP proposal includes transforms + ENCR_3DES, ENCR_AES w/keysize 128, ENCR_AES w/keysize 256, + AUTH_HMAC_MD5, and AUTH_HMAC_SHA, the accepted suite MUST contain one + of the ENCR_ transforms and one of the AUTH_ transforms. Thus, six + combinations are acceptable. + + Since the initiator sends its Diffie-Hellman value in the + IKE_SA_INIT, it must guess the Diffie-Hellman group that the + responder will select from its list of supported groups. If the + initiator guesses wrong, the responder will respond with a Notify + + + +Hoffman Expires July 5, 2006 [Page 28] + +Internet-Draft IKEv2 January 2006 + + + payload of type INVALID_KE_PAYLOAD indicating the selected group. In + this case, the initiator MUST retry the IKE_SA_INIT with the + corrected Diffie-Hellman group. The initiator MUST again propose its + full set of acceptable cryptographic suites because the rejection + message was unauthenticated and otherwise an active attacker could + trick the endpoints into negotiating a weaker suite than a stronger + one that they both prefer. + +2.8. Rekeying + + {{ Demoted the SHOULD }} IKE, ESP, and AH security associations use + secret keys that should be used only for a limited amount of time and + to protect a limited amount of data. This limits the lifetime of the + entire security association. When the lifetime of a security + association expires, the security association MUST NOT be used. If + there is demand, new security associations MAY be established. + Reestablishment of security associations to take the place of ones + that expire is referred to as "rekeying". + + To allow for minimal IPsec implementations, the ability to rekey SAs + without restarting the entire IKE_SA is optional. An implementation + MAY refuse all CREATE_CHILD_SA requests within an IKE_SA. If an SA + has expired or is about to expire and rekeying attempts using the + mechanisms described here fail, an implementation MUST close the + IKE_SA and any associated CHILD_SAs and then MAY start new ones. {{ + Demoted the SHOULD }} Implementations should support in-place + rekeying of SAs, since doing so offers better performance and is + likely to reduce the number of packets lost during the transition. + + To rekey a CHILD_SA within an existing IKE_SA, create a new, + equivalent SA (see Section 2.17 below), and when the new one is + established, delete the old one. To rekey an IKE_SA, establish a new + equivalent IKE_SA (see Section 2.18 below) with the peer to whom the + old IKE_SA is shared using a CREATE_CHILD_SA within the existing + IKE_SA. An IKE_SA so created inherits all of the original IKE_SA's + CHILD_SAs. Use the new IKE_SA for all control messages needed to + maintain the CHILD_SAs created by the old IKE_SA, and delete the old + IKE_SA. The Delete payload to delete itself MUST be the last request + sent over an IKE_SA. + + {{ Demoted the SHOULD }} SAs should be rekeyed proactively, i.e., the + new SA should be established before the old one expires and becomes + unusable. Enough time should elapse between the time the new SA is + established and the old one becomes unusable so that traffic can be + switched over to the new SA. + + A difference between IKEv1 and IKEv2 is that in IKEv1 SA lifetimes + were negotiated. In IKEv2, each end of the SA is responsible for + + + +Hoffman Expires July 5, 2006 [Page 29] + +Internet-Draft IKEv2 January 2006 + + + enforcing its own lifetime policy on the SA and rekeying the SA when + necessary. If the two ends have different lifetime policies, the end + with the shorter lifetime will end up always being the one to request + the rekeying. If an SA bundle has been inactive for a long time and + if an endpoint would not initiate the SA in the absence of traffic, + the endpoint MAY choose to close the SA instead of rekeying it when + its lifetime expires. {{ Demoted the SHOULD }} It should do so if + there has been no traffic since the last time the SA was rekeyed. + + Note that IKEv2 deliberately allows parallel SAs with the same + traffic selectors between common endpoints. One of the purposes of + this is to support traffic quality of service (QoS) differences among + the SAs (see [DIFFSERVFIELD], [DIFFSERVARCH], and section 4.1 of + [DIFFTUNNEL]). Hence unlike IKEv1, the combination of the endpoints + and the traffic selectors may not uniquely identify an SA between + those endpoints, so the IKEv1 rekeying heuristic of deleting SAs on + the basis of duplicate traffic selectors SHOULD NOT be used. + + {{ Demoted the SHOULD }} The node that initiated the surviving + rekeyed SA should delete the replaced SA after the new one is + established. + + There are timing windows -- particularly in the presence of lost + packets -- where endpoints may not agree on the state of an SA. The + responder to a CREATE_CHILD_SA MUST be prepared to accept messages on + an SA before sending its response to the creation request, so there + is no ambiguity for the initiator. The initiator MAY begin sending + on an SA as soon as it processes the response. The initiator, + however, cannot receive on a newly created SA until it receives and + processes the response to its CREATE_CHILD_SA request. How, then, is + the responder to know when it is OK to send on the newly created SA? + + From a technical correctness and interoperability perspective, the + responder MAY begin sending on an SA as soon as it sends its response + to the CREATE_CHILD_SA request. In some situations, however, this + could result in packets unnecessarily being dropped, so an + implementation MAY want to defer such sending. + + The responder can be assured that the initiator is prepared to + receive messages on an SA if either (1) it has received a + cryptographically valid message on the new SA, or (2) the new SA + rekeys an existing SA and it receives an IKE request to close the + replaced SA. {{ Clarif-5.10 }} When rekeying an SA, the responder + SHOULD continue to send traffic on the old SA until one of those + events occurs. When establishing a new SA, the responder MAY defer + sending messages on a new SA until either it receives one or a + timeout has occurred. {{ Demoted the SHOULD }} If an initiator + receives a message on an SA for which it has not received a response + + + +Hoffman Expires July 5, 2006 [Page 30] + +Internet-Draft IKEv2 January 2006 + + + to its CREATE_CHILD_SA request, it should interpret that as a likely + packet loss and retransmit the CREATE_CHILD_SA request. An initiator + MAY send a dummy message on a newly created SA if it has no messages + queued in order to assure the responder that the initiator is ready + to receive messages. + + {{ Clarif-5.9 }} Throughout this document, "initiator" refers to the + party who initiated the exchange being described, and "original + initiator" refers to the party who initiated the whole IKE_SA. The + "original initiator" always refers to the party who initiated the + exchange which resulted in the current IKE_SA. In other words, if + the the "original responder" starts rekeying the IKE_SA, that party + becomes the "original initiator" of the new IKE_SA. + +2.8.1. Simultaneous CHILD_SA rekeying + + {{ The first two paragraphs were moved, and the rest was added, based + on Clarif-5.12 }} + + If the two ends have the same lifetime policies, it is possible that + both will initiate a rekeying at the same time (which will result in + redundant SAs). To reduce the probability of this happening, the + timing of rekeying requests SHOULD be jittered (delayed by a random + amount of time after the need for rekeying is noticed). + + This form of rekeying may temporarily result in multiple similar SAs + between the same pairs of nodes. When there are two SAs eligible to + receive packets, a node MUST accept incoming packets through either + SA. If redundant SAs are created though such a collision, the SA + created with the lowest of the four nonces used in the two exchanges + SHOULD be closed by the endpoint that created it. {{ Clarif-5.11 }} + "Lowest" means an octet-by-octet, lexicographical comparison (instead + of, for instance, comparing the nonces as large integers). In other + words, start by comparing the first octet; if they're equal, move to + the next octet, and so on. If you reach the end of one nonce, that + nonce is the lower one. + + The following is an explanation on the impact this has on + implementations. Assume that hosts A and B have an existing IPsec SA + pair with SPIs (SPIa1,SPIb1), and both start rekeying it at the same + time: + + Host A Host B + ------------------------------------------------------------------- + send req1: N(REKEY_SA,SPIa1), + SA(..,SPIa2,..),Ni1,.. --> + <-- send req2: N(REKEY_SA,SPIb1), + SA(..,SPIb2,..),Ni2 + + + +Hoffman Expires July 5, 2006 [Page 31] + +Internet-Draft IKEv2 January 2006 + + + recv req2 <-- + + At this point, A knows there is a simultaneous rekeying going on. + However, it cannot yet know which of the exchanges will have the + lowest nonce, so it will just note the situation and respond as + usual. + + send resp2: SA(..,SPIa3,..), + Nr1,.. --> + --> recv req1 + + Now B also knows that simultaneous rekeying is going on. It responds + as usual. + + <-- send resp1: SA(..,SPIb3,..), + Nr2,.. + recv resp1 <-- + --> recv resp2 + + At this point, there are three CHILD_SA pairs between A and B (the + old one and two new ones). A and B can now compare the nonces. + Suppose that the lowest nonce was Nr1 in message resp2; in this case, + B (the sender of req2) deletes the redundant new SA, and A (the node + that initiated the surviving rekeyed SA), deletes the old one. + + send req3: D(SPIa1) --> + <-- send req4: D(SPIb2) + --> recv req3 + <-- send resp4: D(SPIb1) + recv req4 <-- + send resp4: D(SPIa3) --> + + The rekeying is now finished. + + However, there is a second possible sequence of events that can + happen if some packets are lost in the network, resulting in + retransmissions. The rekeying begins as usual, but A's first packet + (req1) is lost. + + + + + + + + + + + + + +Hoffman Expires July 5, 2006 [Page 32] + +Internet-Draft IKEv2 January 2006 + + + Host A Host B + ------------------------------------------------------------------- + send req1: N(REKEY_SA,SPIa1), + SA(..,SPIa2,..), + Ni1,.. --> (lost) + <-- send req2: N(REKEY_SA,SPIb1), + SA(..,SPIb2,..),Ni2 + recv req2 <-- + send resp2: SA(..,SPIa3,..), + Nr1,.. --> + --> recv resp2 + <-- send req3: D(SPIb1) + recv req3 <-- + send resp3: D(SPIa1) --> + --> recv resp3 + + From B's point of view, the rekeying is now completed, and since it + has not yet received A's req1, it does not even know that these was + simultaneous rekeying. However, A will continue retransmitting the + message, and eventually it will reach B. + + resend req1 --> + --> recv req1 + + To B, it looks like A is trying to rekey an SA that no longer exists; + thus, B responds to the request with something non-fatal such as + NO_PROPOSAL_CHOSEN. + + <-- send resp1: N(NO_PROPOSAL_CHOSEN) + recv resp1 <-- + + When A receives this error, it already knows there was simultaneous + rekeying, so it can ignore the error message. + +2.8.2. Rekeying the IKE_SA Versus Reauthentication + + {{ Added this section from Clarif-5.2 }} + + Rekeying the IKE_SA and reauthentication are different concepts in + IKEv2. Rekeying the IKE_SA establishes new keys for the IKE_SA and + resets the Message ID counters, but it does not authenticate the + parties again (no AUTH or EAP payloads are involved). + + Although rekeying the IKE_SA may be important in some environments, + reauthentication (the verification that the parties still have access + to the long-term credentials) is often more important. + + IKEv2 does not have any special support for reauthentication. + + + +Hoffman Expires July 5, 2006 [Page 33] + +Internet-Draft IKEv2 January 2006 + + + Reauthentication is done by creating a new IKE_SA from scratch (using + IKE_SA_INIT/IKE_AUTH exchanges, without any REKEY_SA notify + payloads), creating new CHILD_SAs within the new IKE_SA (without + REKEY_SA notify payloads), and finally deleting the old IKE_SA (which + deletes the old CHILD_SAs as well). + + This means that reauthentication also establishes new keys for the + IKE_SA and CHILD_SAs. Therefore, while rekeying can be performed + more often than reauthentication, the situation where "authentication + lifetime" is shorter than "key lifetime" does not make sense. + + While creation of a new IKE_SA can be initiated by either party + (initiator or responder in the original IKE_SA), the use of EAP + authentication and/or configuration payloads means in practice that + reauthentication has to be initiated by the same party as the + original IKE_SA. IKEv2 does not currently allow the responder to + request reauthentication in this case; however, there is ongoing work + to add this functionality [REAUTH]. + +2.9. Traffic Selector Negotiation + + {{ Clarif-7.2 }} When an RFC4301-compliant IPsec subsystem receives + an IP packet and matches a "protect" selector in its Security Policy + Database (SPD), the subsystem protects that packet with IPsec. When + no SA exists yet, it is the task of IKE to create it. Maintenance of + a system's SPD is outside the scope of IKE (see [PFKEY] for an + example protocol), though some implementations might update their SPD + in connection with the running of IKE (for an example scenario, see + Section 1.1.3). + + Traffic Selector (TS) payloads allow endpoints to communicate some of + the information from their SPD to their peers. TS payloads specify + the selection criteria for packets that will be forwarded over the + newly set up SA. This can serve as a consistency check in some + scenarios to assure that the SPDs are consistent. In others, it + guides the dynamic update of the SPD. + + Two TS payloads appear in each of the messages in the exchange that + creates a CHILD_SA pair. Each TS payload contains one or more + Traffic Selectors. Each Traffic Selector consists of an address + range (IPv4 or IPv6), a port range, and an IP protocol ID. In + support of the scenario described in Section 1.1.3, an initiator may + request that the responder assign an IP address and tell the + initiator what it is. {{ Clarif-6.1 }} That request is done using + configuration payloads, not traffic selectors. An address in a TSi + payload in a response does not mean that the responder has assigned + that address to the initiator: it only means that if packets matching + these traffic selectors are sent by the initiator, IPsec processing + + + +Hoffman Expires July 5, 2006 [Page 34] + +Internet-Draft IKEv2 January 2006 + + + can be performed as agreed for this SA. + + IKEv2 allows the responder to choose a subset of the traffic proposed + by the initiator. This could happen when the configurations of the + two endpoints are being updated but only one end has received the new + information. Since the two endpoints may be configured by different + people, the incompatibility may persist for an extended period even + in the absence of errors. It also allows for intentionally different + configurations, as when one end is configured to tunnel all addresses + and depends on the other end to have the up-to-date list. + + The first of the two TS payloads is known as TSi (Traffic Selector- + initiator). The second is known as TSr (Traffic Selector-responder). + TSi specifies the source address of traffic forwarded from (or the + destination address of traffic forwarded to) the initiator of the + CHILD_SA pair. TSr specifies the destination address of the traffic + forwarded to (or the source address of the traffic forwarded from) + the responder of the CHILD_SA pair. For example, if the original + initiator request the creation of a CHILD_SA pair, and wishes to + tunnel all traffic from subnet 192.0.1.* on the initiator's side to + subnet 192.0.2.* on the responder's side, the initiator would include + a single traffic selector in each TS payload. TSi would specify the + address range (192.0.1.0 - 192.0.1.255) and TSr would specify the + address range (192.0.2.0 - 192.0.2.255). Assuming that proposal was + acceptable to the responder, it would send identical TS payloads + back. (Note: The IP address range 192.0.2.* has been reserved for + use in examples in RFCs and similar documents. This document needed + two such ranges, and so also used 192.0.1.*. This should not be + confused with any actual address.) + + The responder is allowed to narrow the choices by selecting a subset + of the traffic, for instance by eliminating or narrowing the range of + one or more members of the set of traffic selectors, provided the set + does not become the NULL set. + + It is possible for the responder's policy to contain multiple smaller + ranges, all encompassed by the initiator's traffic selector, and with + the responder's policy being that each of those ranges should be sent + over a different SA. Continuing the example above, the responder + might have a policy of being willing to tunnel those addresses to and + from the initiator, but might require that each address pair be on a + separately negotiated CHILD_SA. If the initiator generated its + request in response to an incoming packet from 192.0.1.43 to + 192.0.2.123, there would be no way for the responder to determine + which pair of addresses should be included in this tunnel, and it + would have to make a guess or reject the request with a status of + SINGLE_PAIR_REQUIRED. + + + + +Hoffman Expires July 5, 2006 [Page 35] + +Internet-Draft IKEv2 January 2006 + + + {{ Clarif-4.11 }} Few implementations will have policies that require + separate SAs for each address pair. Because of this, if only some + part (or parts) of the TSi/TSr proposed by the initiator is (are) + acceptable to the responder, responders SHOULD narrow TSi/TSr to an + acceptable subset rather than use SINGLE_PAIR_REQUIRED. + + To enable the responder to choose the appropriate range in this case, + if the initiator has requested the SA due to a data packet, the + initiator SHOULD include as the first traffic selector in each of TSi + and TSr a very specific traffic selector including the addresses in + the packet triggering the request. In the example, the initiator + would include in TSi two traffic selectors: the first containing the + address range (192.0.1.43 - 192.0.1.43) and the source port and IP + protocol from the packet and the second containing (192.0.1.0 - + 192.0.1.255) with all ports and IP protocols. The initiator would + similarly include two traffic selectors in TSr. + + If the responder's policy does not allow it to accept the entire set + of traffic selectors in the initiator's request, but does allow him + to accept the first selector of TSi and TSr, then the responder MUST + narrow the traffic selectors to a subset that includes the + initiator's first choices. In this example, the responder might + respond with TSi being (192.0.1.43 - 192.0.1.43) with all ports and + IP protocols. + + If the initiator creates the CHILD_SA pair not in response to an + arriving packet, but rather, say, upon startup, then there may be no + specific addresses the initiator prefers for the initial tunnel over + any other. In that case, the first values in TSi and TSr MAY be + ranges rather than specific values, and the responder chooses a + subset of the initiator's TSi and TSr that are acceptable. If more + than one subset is acceptable but their union is not, the responder + MUST accept some subset and MAY include a Notify payload of type + ADDITIONAL_TS_POSSIBLE to indicate that the initiator might want to + try again. This case will occur only when the initiator and + responder are configured differently from one another. If the + initiator and responder agree on the granularity of tunnels, the + initiator will never request a tunnel wider than the responder will + accept. {{ Demoted the SHOULD }} Such misconfigurations should be + recorded in error logs. + + {{ Clarif-4.10 }} A concise summary of the narrowing process is: + + o If the responder's policy does not allow any part of the traffic + covered by TSi/TSr, it responds with TS_UNACCEPTABLE. + + o If the responder's policy allows the entire set of traffic covered + by TSi/TSr, no narrowing is necessary, and the responder can + + + +Hoffman Expires July 5, 2006 [Page 36] + +Internet-Draft IKEv2 January 2006 + + + return the same TSi/TSr values. + + o Otherwise, narrowing is needed. If the responder's policy allows + all traffic covered by TSi[1]/TSr[1] (the first traffic selectors + in TSi/TSr) but not entire TSi/TSr, the responder narrows to an + acceptable subset of TSi/TSr that includes TSi[1]/TSr[1]. + + o If the responder's policy does not allow all traffic covered by + TSi[1]/TSr[1], but does allow some parts of TSi/TSr, it narrows to + an acceptable subset of TSi/TSr. + + In the last two cases, there may be several subsets that are + acceptable (but their union is not); in this case, the responder + arbitrarily chooses one of them, and includes ADDITIONAL_TS_POSSIBLE + notification in the response. + +2.9.1. Traffic Selectors Violating Own Policy + + {{ Clarif-4.12 }} + + When creating a new SA, the initiator should not propose traffic + selectors that violate its own policy. If this rule is not followed, + valid traffic may be dropped. + + This is best illustrated by an example. Suppose that host A has a + policy whose effect is that traffic to 192.0.1.66 is sent via host B + encrypted using AES, and traffic to all other hosts in 192.0.1.0/24 + is also sent via B, but must use 3DES. Suppose also that host B + accepts any combination of AES and 3DES. + + If host A now proposes an SA that uses 3DES, and includes TSr + containing (192.0.1.0-192.0.1.0.255), this will be accepted by host + B. Now, host B can also use this SA to send traffic from 192.0.1.66, + but those packets will be dropped by A since it requires the use of + AES for those traffic. Even if host A creates a new SA only for + 192.0.1.66 that uses AES, host B may freely continue to use the first + SA for the traffic. In this situation, when proposing the SA, host A + should have followed its own policy, and included a TSr containing + ((192.0.1.0-192.0.1.65),(192.0.1.67-192.0.1.255)) instead. + + In general, if (1) the initiator makes a proposal "for traffic X + (TSi/TSr), do SA", and (2) for some subset X' of X, the initiator + does not actually accept traffic X' with SA, and (3) the initiator + would be willing to accept traffic X' with some SA' (!=SA), valid + traffic can be unnecessarily dropped since the responder can apply + either SA or SA' to traffic X'. + + + + + +Hoffman Expires July 5, 2006 [Page 37] + +Internet-Draft IKEv2 January 2006 + + +2.10. Nonces + + The IKE_SA_INIT messages each contain a nonce. These nonces are used + as inputs to cryptographic functions. The CREATE_CHILD_SA request + and the CREATE_CHILD_SA response also contain nonces. These nonces + are used to add freshness to the key derivation technique used to + obtain keys for CHILD_SA, and to ensure creation of strong pseudo- + random bits from the Diffie-Hellman key. Nonces used in IKEv2 MUST + be randomly chosen, MUST be at least 128 bits in size, and MUST be at + least half the key size of the negotiated prf. ("prf" refers to + "pseudo-random function", one of the cryptographic algorithms + negotiated in the IKE exchange.) {{ Clarif-7.4 }} However, the + initiator chooses the nonce before the outcome of the negotiation is + known. Because of that, the nonce has to be long enough for all the + PRFs being proposed. If the same random number source is used for + both keys and nonces, care must be taken to ensure that the latter + use does not compromise the former. + +2.11. Address and Port Agility + + IKE runs over UDP ports 500 and 4500, and implicitly sets up ESP and + AH associations for the same IP addresses it runs over. The IP + addresses and ports in the outer header are, however, not themselves + cryptographically protected, and IKE is designed to work even through + Network Address Translation (NAT) boxes. An implementation MUST + accept incoming requests even if the source port is not 500 or 4500, + and MUST respond to the address and port from which the request was + received. It MUST specify the address and port at which the request + was received as the source address and port in the response. IKE + functions identically over IPv4 or IPv6. + +2.12. Reuse of Diffie-Hellman Exponentials + + IKE generates keying material using an ephemeral Diffie-Hellman + exchange in order to gain the property of "perfect forward secrecy". + This means that once a connection is closed and its corresponding + keys are forgotten, even someone who has recorded all of the data + from the connection and gets access to all of the long-term keys of + the two endpoints cannot reconstruct the keys used to protect the + conversation without doing a brute force search of the session key + space. + + Achieving perfect forward secrecy requires that when a connection is + closed, each endpoint MUST forget not only the keys used by the + connection but also any information that could be used to recompute + those keys. In particular, it MUST forget the secrets used in the + Diffie-Hellman calculation and any state that may persist in the + state of a pseudo-random number generator that could be used to + + + +Hoffman Expires July 5, 2006 [Page 38] + +Internet-Draft IKEv2 January 2006 + + + recompute the Diffie-Hellman secrets. + + Since the computing of Diffie-Hellman exponentials is computationally + expensive, an endpoint may find it advantageous to reuse those + exponentials for multiple connection setups. There are several + reasonable strategies for doing this. An endpoint could choose a new + exponential only periodically though this could result in less-than- + perfect forward secrecy if some connection lasts for less than the + lifetime of the exponential. Or it could keep track of which + exponential was used for each connection and delete the information + associated with the exponential only when some corresponding + connection was closed. This would allow the exponential to be reused + without losing perfect forward secrecy at the cost of maintaining + more state. + + Decisions as to whether and when to reuse Diffie-Hellman exponentials + is a private decision in the sense that it will not affect + interoperability. An implementation that reuses exponentials MAY + choose to remember the exponential used by the other endpoint on past + exchanges and if one is reused to avoid the second half of the + calculation. + +2.13. Generating Keying Material + + In the context of the IKE_SA, four cryptographic algorithms are + negotiated: an encryption algorithm, an integrity protection + algorithm, a Diffie-Hellman group, and a pseudo-random function + (prf). The pseudo-random function is used for the construction of + keying material for all of the cryptographic algorithms used in both + the IKE_SA and the CHILD_SAs. + + We assume that each encryption algorithm and integrity protection + algorithm uses a fixed-size key and that any randomly chosen value of + that fixed size can serve as an appropriate key. For algorithms that + accept a variable length key, a fixed key size MUST be specified as + part of the cryptographic transform negotiated. For algorithms for + which not all values are valid keys (such as DES or 3DES with key + parity), the algorithm by which keys are derived from arbitrary + values MUST be specified by the cryptographic transform. For + integrity protection functions based on Hashed Message Authentication + Code (HMAC), the fixed key size is the size of the output of the + underlying hash function. When the prf function takes a variable + length key, variable length data, and produces a fixed-length output + (e.g., when using HMAC), the formulas in this document apply. When + the key for the prf function has fixed length, the data provided as a + key is truncated or padded with zeros as necessary unless exceptional + processing is explained following the formula. + + + + +Hoffman Expires July 5, 2006 [Page 39] + +Internet-Draft IKEv2 January 2006 + + + Keying material will always be derived as the output of the + negotiated prf algorithm. Since the amount of keying material needed + may be greater than the size of the output of the prf algorithm, we + will use the prf iteratively. We will use the terminology prf+ to + describe the function that outputs a pseudo-random stream based on + the inputs to a prf as follows: (where | indicates concatenation) + + prf+ (K,S) = T1 | T2 | T3 | T4 | ... + + where: + T1 = prf (K, S | 0x01) + T2 = prf (K, T1 | S | 0x02) + T3 = prf (K, T2 | S | 0x03) + T4 = prf (K, T3 | S | 0x04) + + continuing as needed to compute all required keys. The keys are + taken from the output string without regard to boundaries (e.g., if + the required keys are a 256-bit Advanced Encryption Standard (AES) + key and a 160-bit HMAC key, and the prf function generates 160 bits, + the AES key will come from T1 and the beginning of T2, while the HMAC + key will come from the rest of T2 and the beginning of T3). + + The constant concatenated to the end of each string feeding the prf + is a single octet. prf+ in this document is not defined beyond 255 + times the size of the prf output. + +2.14. Generating Keying Material for the IKE_SA + + The shared keys are computed as follows. A quantity called SKEYSEED + is calculated from the nonces exchanged during the IKE_SA_INIT + exchange and the Diffie-Hellman shared secret established during that + exchange. SKEYSEED is used to calculate seven other secrets: SK_d + used for deriving new keys for the CHILD_SAs established with this + IKE_SA; SK_ai and SK_ar used as a key to the integrity protection + algorithm for authenticating the component messages of subsequent + exchanges; SK_ei and SK_er used for encrypting (and of course + decrypting) all subsequent exchanges; and SK_pi and SK_pr, which are + used when generating an AUTH payload. + + SKEYSEED and its derivatives are computed as follows: + + SKEYSEED = prf(Ni | Nr, g^ir) + + {SK_d | SK_ai | SK_ar | SK_ei | SK_er | SK_pi | SK_pr } + = prf+ (SKEYSEED, Ni | Nr | SPIi | SPIr ) + + (indicating that the quantities SK_d, SK_ai, SK_ar, SK_ei, SK_er, + SK_pi, and SK_pr are taken in order from the generated bits of the + + + +Hoffman Expires July 5, 2006 [Page 40] + +Internet-Draft IKEv2 January 2006 + + + prf+). g^ir is the shared secret from the ephemeral Diffie-Hellman + exchange. g^ir is represented as a string of octets in big endian + order padded with zeros if necessary to make it the length of the + modulus. Ni and Nr are the nonces, stripped of any headers. If the + negotiated prf takes a fixed-length key and the lengths of Ni and Nr + do not add up to that length, half the bits must come from Ni and + half from Nr, taking the first bits of each. + + The two directions of traffic flow use different keys. The keys used + to protect messages from the original initiator are SK_ai and SK_ei. + The keys used to protect messages in the other direction are SK_ar + and SK_er. Each algorithm takes a fixed number of bits of keying + material, which is specified as part of the algorithm. For integrity + algorithms based on a keyed hash, the key size is always equal to the + length of the output of the underlying hash function. + +2.15. Authentication of the IKE_SA + + When not using extensible authentication (see Section 2.16), the + peers are authenticated by having each sign (or MAC using a shared + secret as the key) a block of data. For the responder, the octets to + be signed start with the first octet of the first SPI in the header + of the second message and end with the last octet of the last payload + in the second message. Appended to this (for purposes of computing + the signature) are the initiator's nonce Ni (just the value, not the + payload containing it), and the value prf(SK_pr,IDr') where IDr' is + the responder's ID payload excluding the fixed header. Note that + neither the nonce Ni nor the value prf(SK_pr,IDr') are transmitted. + Similarly, the initiator signs the first message, starting with the + first octet of the first SPI in the header and ending with the last + octet of the last payload. Appended to this (for purposes of + computing the signature) are the responder's nonce Nr, and the value + prf(SK_pi,IDi'). In the above calculation, IDi' and IDr' are the + entire ID payloads excluding the fixed header. It is critical to the + security of the exchange that each side sign the other side's nonce. + + {{ Clarif-3.1 }} + + The initiator's signed octets can be described as: + + InitiatorSignedOctets = RealMessage1 | NonceRData | MACedIDForI + GenIKEHDR = [ four octets 0 if using port 4500 ] | RealIKEHDR + RealIKEHDR = SPIi | SPIr | . . . | Length + RealMessage1 = RealIKEHDR | RestOfMessage1 + NonceRPayload = PayloadHeader | NonceRData + InitiatorIDPayload = PayloadHeader | RestOfIDPayload + RestOfInitIDPayload = IDType | RESERVED | InitIDData + MACedIDForI = prf(SK_pi, RestOfInitIDPayload) + + + +Hoffman Expires July 5, 2006 [Page 41] + +Internet-Draft IKEv2 January 2006 + + + The responder's signed octets can be described as: + + ResponderSignedOctets = RealMessage2 | NonceIData | MACedIDForR + GenIKEHDR = [ four octets 0 if using port 4500 ] | RealIKEHDR + RealIKEHDR = SPIi | SPIr | . . . | Length + RealMessage2 = RealIKEHDR | RestOfMessage2 + NonceIPayload = PayloadHeader | NonceIData + ResponderIDPayload = PayloadHeader | RestOfIDPayload + RestOfRespIDPayload = IDType | RESERVED | InitIDData + MACedIDForR = prf(SK_pr, RestOfRespIDPayload) + + Note that all of the payloads are included under the signature, + including any payload types not defined in this document. If the + first message of the exchange is sent twice (the second time with a + responder cookie and/or a different Diffie-Hellman group), it is the + second version of the message that is signed. + + Optionally, messages 3 and 4 MAY include a certificate, or + certificate chain providing evidence that the key used to compute a + digital signature belongs to the name in the ID payload. The + signature or MAC will be computed using algorithms dictated by the + type of key used by the signer, and specified by the Auth Method + field in the Authentication payload. There is no requirement that + the initiator and responder sign with the same cryptographic + algorithms. The choice of cryptographic algorithms depends on the + type of key each has. In particular, the initiator may be using a + shared key while the responder may have a public signature key and + certificate. It will commonly be the case (but it is not required) + that if a shared secret is used for authentication that the same key + is used in both directions. Note that it is a common but typically + insecure practice to have a shared key derived solely from a user- + chosen password without incorporating another source of randomness. + + This is typically insecure because user-chosen passwords are unlikely + to have sufficient unpredictability to resist dictionary attacks and + these attacks are not prevented in this authentication method. + (Applications using password-based authentication for bootstrapping + and IKE_SA should use the authentication method in Section 2.16, + which is designed to prevent off-line dictionary attacks.) {{ Demoted + the SHOULD }} The pre-shared key needs to contain as much + unpredictability as the strongest key being negotiated. In the case + of a pre-shared key, the AUTH value is computed as: + + AUTH = prf(prf(Shared Secret,"Key Pad for IKEv2"), <msg octets>) + + where the string "Key Pad for IKEv2" is 17 ASCII characters without + null termination. The shared secret can be variable length. The pad + string is added so that if the shared secret is derived from a + + + +Hoffman Expires July 5, 2006 [Page 42] + +Internet-Draft IKEv2 January 2006 + + + password, the IKE implementation need not store the password in + cleartext, but rather can store the value prf(Shared Secret,"Key Pad + for IKEv2"), which could not be used as a password equivalent for + protocols other than IKEv2. As noted above, deriving the shared + secret from a password is not secure. This construction is used + because it is anticipated that people will do it anyway. The + management interface by which the Shared Secret is provided MUST + accept ASCII strings of at least 64 octets and MUST NOT add a null + terminator before using them as shared secrets. It MUST also accept + a HEX encoding of the Shared Secret. The management interface MAY + accept other encodings if the algorithm for translating the encoding + to a binary string is specified. + + {{ Clarif-3.8 }} If the negotiated prf takes a fixed-size key, the + shared secret MUST be of that fixed size. This requirement means + that it is difficult to use these PRFs with shared key authentication + because it limits the shared secrets that can be used. Thus, PRFs + that require a fixed-size key SHOULD NOT be used with shared key + authentication. For example, PRF_AES128_CBC [PRFAES128CBC] + originally used fixed key sizes; that RFC has been updated to handle + variable key sizes in [PRFAES128CBC-bis]. Note that Section 2.13 + also contains text that is related to PRFs with fixed key size. + However, the text in that section applies only to the prf+ + construction. + +2.16. Extensible Authentication Protocol Methods + + In addition to authentication using public key signatures and shared + secrets, IKE supports authentication using methods defined in RFC + 3748 [EAP]. Typically, these methods are asymmetric (designed for a + user authenticating to a server), and they may not be mutual. For + this reason, these protocols are typically used to authenticate the + initiator to the responder and MUST be used in conjunction with a + public key signature based authentication of the responder to the + initiator. These methods are often associated with mechanisms + referred to as "Legacy Authentication" mechanisms. + + While this memo references [EAP] with the intent that new methods can + be added in the future without updating this specification, some + simpler variations are documented here and in Section 3.16. [EAP] + defines an authentication protocol requiring a variable number of + messages. Extensible Authentication is implemented in IKE as + additional IKE_AUTH exchanges that MUST be completed in order to + initialize the IKE_SA. + + An initiator indicates a desire to use extensible authentication by + leaving out the AUTH payload from message 3. By including an IDi + payload but not an AUTH payload, the initiator has declared an + + + +Hoffman Expires July 5, 2006 [Page 43] + +Internet-Draft IKEv2 January 2006 + + + identity but has not proven it. If the responder is willing to use + an extensible authentication method, it will place an Extensible + Authentication Protocol (EAP) payload in message 4 and defer sending + SAr2, TSi, and TSr until initiator authentication is complete in a + subsequent IKE_AUTH exchange. In the case of a minimal extensible + authentication, the initial SA establishment will appear as follows: + + Initiator Responder + ------------------------------------------------------------------- + HDR, SAi1, KEi, Ni --> + <-- HDR, SAr1, KEr, Nr, [CERTREQ] + HDR, SK {IDi, [CERTREQ,] + [IDr,] SAi2, + TSi, TSr} --> + <-- HDR, SK {IDr, [CERT,] AUTH, + EAP } + HDR, SK {EAP} --> + <-- HDR, SK {EAP (success)} + HDR, SK {AUTH} --> + <-- HDR, SK {AUTH, SAr2, TSi, TSr } + + {{ Clarif-3.11 }} As described in Section 2.2, when EAP is used, each + pair of IKE_SA initial setup messages will have their message numbers + incremented; the first pair of AUTH messages will have an ID of 1, + the second will be 2, and so on. + + For EAP methods that create a shared key as a side effect of + authentication, that shared key MUST be used by both the initiator + and responder to generate AUTH payloads in messages 7 and 8 using the + syntax for shared secrets specified in Section 2.15. The shared key + from EAP is the field from the EAP specification named MSK. The + shared key generated during an IKE exchange MUST NOT be used for any + other purpose. + + EAP methods that do not establish a shared key SHOULD NOT be used, as + they are subject to a number of man-in-the-middle attacks [EAPMITM] + if these EAP methods are used in other protocols that do not use a + server-authenticated tunnel. Please see the Security Considerations + section for more details. If EAP methods that do not generate a + shared key are used, the AUTH payloads in messages 7 and 8 MUST be + generated using SK_pi and SK_pr, respectively. + + {{ Demoted the SHOULD }} The initiator of an IKE_SA using EAP needs + to be capable of extending the initial protocol exchange to at least + ten IKE_AUTH exchanges in the event the responder sends notification + messages and/or retries the authentication prompt. Once the protocol + exchange defined by the chosen EAP authentication method has + successfully terminated, the responder MUST send an EAP payload + + + +Hoffman Expires July 5, 2006 [Page 44] + +Internet-Draft IKEv2 January 2006 + + + containing the Success message. Similarly, if the authentication + method has failed, the responder MUST send an EAP payload containing + the Failure message. The responder MAY at any time terminate the IKE + exchange by sending an EAP payload containing the Failure message. + + Following such an extended exchange, the EAP AUTH payloads MUST be + included in the two messages following the one containing the EAP + Success message. + + {{ Clarif-3.5 }} When the initiator authentication uses EAP, it is + possible that the contents of the IDi payload is used only for AAA + routing purposes and selecting which EAP method to use. This value + may be different from the identity authenticated by the EAP method. + It is important that policy lookups and access control decisions use + the actual authenticated identity. Often the EAP server is + implemented in a separate AAA server that communicates with the IKEv2 + responder. In this case, the authenticated identity has to be sent + from the AAA server to the IKEv2 responder. + + {{ Clarif-3.9 }} The information in Section 2.17 about PRFs with + fixed-size keys also applies to EAP authentication. For instance, a + PRF that requires a 128-bit key cannot be used with EAP because + specifies that the MSK is at least 512 bits long. + +2.17. Generating Keying Material for CHILD_SAs + + A single CHILD_SA is created by the IKE_AUTH exchange, and additional + CHILD_SAs can optionally be created in CREATE_CHILD_SA exchanges. + Keying material for them is generated as follows: + + KEYMAT = prf+(SK_d, Ni | Nr) + + Where Ni and Nr are the nonces from the IKE_SA_INIT exchange if this + request is the first CHILD_SA created or the fresh Ni and Nr from the + CREATE_CHILD_SA exchange if this is a subsequent creation. + + For CREATE_CHILD_SA exchanges including an optional Diffie-Hellman + exchange, the keying material is defined as: + + KEYMAT = prf+(SK_d, g^ir (new) | Ni | Nr ) + + where g^ir (new) is the shared secret from the ephemeral Diffie- + Hellman exchange of this CREATE_CHILD_SA exchange (represented as an + octet string in big endian order padded with zeros in the high-order + bits if necessary to make it the length of the modulus). + + A single CHILD_SA negotiation may result in multiple security + associations. ESP and AH SAs exist in pairs (one in each direction), + + + +Hoffman Expires July 5, 2006 [Page 45] + +Internet-Draft IKEv2 January 2006 + + + and four SAs could be created in a single CHILD_SA negotiation if a + combination of ESP and AH is being negotiated. + + Keying material MUST be taken from the expanded KEYMAT in the + following order: + + o All keys for SAs carrying data from the initiator to the responder + are taken before SAs going in the reverse direction. + + o If multiple IPsec protocols are negotiated, keying material is + taken in the order in which the protocol headers will appear in + the encapsulated packet. + + o If a single protocol has both encryption and authentication keys, + the encryption key is taken from the first octets of KEYMAT and + the authentication key is taken from the next octets. + + Each cryptographic algorithm takes a fixed number of bits of keying + material specified as part of the algorithm. + +2.18. Rekeying IKE_SAs Using a CREATE_CHILD_SA Exchange + + The CREATE_CHILD_SA exchange can be used to rekey an existing IKE_SA + (see Section 2.8). {{ Clarif-5.3 }} New initiator and responder SPIs + are supplied in the SPI fields in the Proposal structures inside the + Security Association (SA) payloads (not the SPI fields in the IKE + header). The TS payloads are omitted when rekeying an IKE_SA. + SKEYSEED for the new IKE_SA is computed using SK_d from the existing + IKE_SA as follows: + + SKEYSEED = prf(SK_d (old), [g^ir (new)] | Ni | Nr) + + where g^ir (new) is the shared secret from the ephemeral Diffie- + Hellman exchange of this CREATE_CHILD_SA exchange (represented as an + octet string in big endian order padded with zeros if necessary to + make it the length of the modulus) and Ni and Nr are the two nonces + stripped of any headers. + + {{ Clarif-5.5 }} The old and new IKE_SA may have selected a different + PRF. Because the rekeying exchange belongs to the old IKE_SA, it is + the old IKE_SA's PRF that is used. Note that this may not work if + the new IKE_SA's PRF has a fixed key size because the output of the + PRF may not be of the correct size. + + The new IKE_SA MUST reset its message counters to 0. + + SK_d, SK_ai, SK_ar, SK_ei, and SK_er are computed from SKEYSEED as + specified in Section 2.14. + + + +Hoffman Expires July 5, 2006 [Page 46] + +Internet-Draft IKEv2 January 2006 + + +2.19. Requesting an Internal Address on a Remote Network + + Most commonly occurring in the endpoint-to-security-gateway scenario, + an endpoint may need an IP address in the network protected by the + security gateway and may need to have that address dynamically + assigned. A request for such a temporary address can be included in + any request to create a CHILD_SA (including the implicit request in + message 3) by including a CP payload. + + This function provides address allocation to an IPsec Remote Access + Client (IRAC) trying to tunnel into a network protected by an IPsec + Remote Access Server (IRAS). Since the IKE_AUTH exchange creates an + IKE_SA and a CHILD_SA, the IRAC MUST request the IRAS-controlled + address (and optionally other information concerning the protected + network) in the IKE_AUTH exchange. The IRAS may procure an address + for the IRAC from any number of sources such as a DHCP/BOOTP server + or its own address pool. + + Initiator Responder + ------------------------------------------------------------------- + HDR, SK {IDi, [CERT,] + [CERTREQ,] [IDr,] AUTH, + CP(CFG_REQUEST), SAi2, + TSi, TSr} --> + <-- HDR, SK {IDr, [CERT,] AUTH, + CP(CFG_REPLY), SAr2, + TSi, TSr} + + In all cases, the CP payload MUST be inserted before the SA payload. + In variations of the protocol where there are multiple IKE_AUTH + exchanges, the CP payloads MUST be inserted in the messages + containing the SA payloads. + + CP(CFG_REQUEST) MUST contain at least an INTERNAL_ADDRESS attribute + (either IPv4 or IPv6) but MAY contain any number of additional + attributes the initiator wants returned in the response. + + For example, message from initiator to responder: + + {{ Clarif-6.3 }} + + CP(CFG_REQUEST)= + INTERNAL_ADDRESS() + TSi = (0, 0-65535,0.0.0.0-255.255.255.255) + TSr = (0, 0-65535,0.0.0.0-255.255.255.255) + + NOTE: Traffic Selectors contain (protocol, port range, address + range). + + + +Hoffman Expires July 5, 2006 [Page 47] + +Internet-Draft IKEv2 January 2006 + + + Message from responder to initiator: + + CP(CFG_REPLY)= + INTERNAL_ADDRESS(192.0.2.202) + INTERNAL_NETMASK(255.255.255.0) + INTERNAL_SUBNET(192.0.2.0/255.255.255.0) + TSi = (0, 0-65535,192.0.2.202-192.0.2.202) + TSr = (0, 0-65535,192.0.2.0-192.0.2.255) + + All returned values will be implementation dependent. As can be seen + in the above example, the IRAS MAY also send other attributes that + were not included in CP(CFG_REQUEST) and MAY ignore the non- + mandatory attributes that it does not support. + + The responder MUST NOT send a CFG_REPLY without having first received + a CP(CFG_REQUEST) from the initiator, because we do not want the IRAS + to perform an unnecessary configuration lookup if the IRAC cannot + process the REPLY. In the case where the IRAS's configuration + requires that CP be used for a given identity IDi, but IRAC has + failed to send a CP(CFG_REQUEST), IRAS MUST fail the request, and + terminate the IKE exchange with a FAILED_CP_REQUIRED error. + +2.20. Requesting the Peer's Version + + An IKE peer wishing to inquire about the other peer's IKE software + version information MAY use the method below. This is an example of + a configuration request within an INFORMATIONAL exchange, after the + IKE_SA and first CHILD_SA have been created. + + An IKE implementation MAY decline to give out version information + prior to authentication or even after authentication to prevent + trolling in case some implementation is known to have some security + weakness. In that case, it MUST either return an empty string or no + CP payload if CP is not supported. + + Initiator Responder + ------------------------------------------------------------------- + HDR, SK{CP(CFG_REQUEST)} --> + <-- HDR, SK{CP(CFG_REPLY)} + + CP(CFG_REQUEST)= + APPLICATION_VERSION("") + + CP(CFG_REPLY) APPLICATION_VERSION("foobar v1.3beta, (c) Foo Bar + Inc.") + + + + + + +Hoffman Expires July 5, 2006 [Page 48] + +Internet-Draft IKEv2 January 2006 + + +2.21. Error Handling + + There are many kinds of errors that can occur during IKE processing. + If a request is received that is badly formatted or unacceptable for + reasons of policy (e.g., no matching cryptographic algorithms), the + response MUST contain a Notify payload indicating the error. If an + error occurs outside the context of an IKE request (e.g., the node is + getting ESP messages on a nonexistent SPI), the node SHOULD initiate + an INFORMATIONAL exchange with a Notify payload describing the + problem. + + Errors that occur before a cryptographically protected IKE_SA is + established must be handled very carefully. There is a trade-off + between wanting to be helpful in diagnosing a problem and responding + to it and wanting to avoid being a dupe in a denial of service attack + based on forged messages. + + If a node receives a message on UDP port 500 or 4500 outside the + context of an IKE_SA known to it (and not a request to start one), it + may be the result of a recent crash of the node. If the message is + marked as a response, the node MAY audit the suspicious event but + MUST NOT respond. If the message is marked as a request, the node + MAY audit the suspicious event and MAY send a response. If a + response is sent, the response MUST be sent to the IP address and + port from whence it came with the same IKE SPIs and the Message ID + copied. The response MUST NOT be cryptographically protected and + MUST contain a Notify payload indicating INVALID_IKE_SPI. + + A node receiving such an unprotected Notify payload MUST NOT respond + and MUST NOT change the state of any existing SAs. The message might + be a forgery or might be a response the genuine correspondent was + tricked into sending. {{ Demoted two SHOULDs }} A node should treat + such a message (and also a network message like ICMP destination + unreachable) as a hint that there might be problems with SAs to that + IP address and should initiate a liveness test for any such IKE_SA. + An implementation SHOULD limit the frequency of such tests to avoid + being tricked into participating in a denial of service attack. + + A node receiving a suspicious message from an IP address with which + it has an IKE_SA MAY send an IKE Notify payload in an IKE + INFORMATIONAL exchange over that SA. {{ Demoted the SHOULD }} The + recipient MUST NOT change the state of any SAs as a result but may + wish to audit the event to aid in diagnosing malfunctions. A node + MUST limit the rate at which it will send messages in response to + unprotected messages. + + + + + + +Hoffman Expires July 5, 2006 [Page 49] + +Internet-Draft IKEv2 January 2006 + + +2.22. IPComp + + Use of IP compression [IPCOMP] can be negotiated as part of the setup + of a CHILD_SA. While IP compression involves an extra header in each + packet and a compression parameter index (CPI), the virtual + "compression association" has no life outside the ESP or AH SA that + contains it. Compression associations disappear when the + corresponding ESP or AH SA goes away. It is not explicitly mentioned + in any DELETE payload. + + Negotiation of IP compression is separate from the negotiation of + cryptographic parameters associated with a CHILD_SA. A node + requesting a CHILD_SA MAY advertise its support for one or more + compression algorithms through one or more Notify payloads of type + IPCOMP_SUPPORTED. The response MAY indicate acceptance of a single + compression algorithm with a Notify payload of type IPCOMP_SUPPORTED. + These payloads MUST NOT occur in messages that do not contain SA + payloads. + + Although there has been discussion of allowing multiple compression + algorithms to be accepted and to have different compression + algorithms available for the two directions of a CHILD_SA, + implementations of this specification MUST NOT accept an IPComp + algorithm that was not proposed, MUST NOT accept more than one, and + MUST NOT compress using an algorithm other than one proposed and + accepted in the setup of the CHILD_SA. + + A side effect of separating the negotiation of IPComp from + cryptographic parameters is that it is not possible to propose + multiple cryptographic suites and propose IP compression with some of + them but not others. + +2.23. NAT Traversal + + Network Address Translation (NAT) gateways are a controversial + subject. This section briefly describes what they are and how they + are likely to act on IKE traffic. Many people believe that NATs are + evil and that we should not design our protocols so as to make them + work better. IKEv2 does specify some unintuitive processing rules in + order that NATs are more likely to work. + + NATs exist primarily because of the shortage of IPv4 addresses, + though there are other rationales. IP nodes that are "behind" a NAT + have IP addresses that are not globally unique, but rather are + assigned from some space that is unique within the network behind the + NAT but that are likely to be reused by nodes behind other NATs. + Generally, nodes behind NATs can communicate with other nodes behind + the same NAT and with nodes with globally unique addresses, but not + + + +Hoffman Expires July 5, 2006 [Page 50] + +Internet-Draft IKEv2 January 2006 + + + with nodes behind other NATs. There are exceptions to that rule. + When those nodes make connections to nodes on the real Internet, the + NAT gateway "translates" the IP source address to an address that + will be routed back to the gateway. Messages to the gateway from the + Internet have their destination addresses "translated" to the + internal address that will route the packet to the correct endnode. + + NATs are designed to be "transparent" to endnodes. Neither software + on the node behind the NAT nor the node on the Internet requires + modification to communicate through the NAT. Achieving this + transparency is more difficult with some protocols than with others. + Protocols that include IP addresses of the endpoints within the + payloads of the packet will fail unless the NAT gateway understands + the protocol and modifies the internal references as well as those in + the headers. Such knowledge is inherently unreliable, is a network + layer violation, and often results in subtle problems. + + Opening an IPsec connection through a NAT introduces special + problems. If the connection runs in transport mode, changing the IP + addresses on packets will cause the checksums to fail and the NAT + cannot correct the checksums because they are cryptographically + protected. Even in tunnel mode, there are routing problems because + transparently translating the addresses of AH and ESP packets + requires special logic in the NAT and that logic is heuristic and + unreliable in nature. For that reason, IKEv2 can negotiate UDP + encapsulation of IKE and ESP packets. This encoding is slightly less + efficient but is easier for NATs to process. In addition, firewalls + may be configured to pass IPsec traffic over UDP but not ESP/AH or + vice versa. + + It is a common practice of NATs to translate TCP and UDP port numbers + as well as addresses and use the port numbers of inbound packets to + decide which internal node should get a given packet. For this + reason, even though IKE packets MUST be sent from and to UDP port + 500, they MUST be accepted coming from any port and responses MUST be + sent to the port from whence they came. This is because the ports + may be modified as the packets pass through NATs. Similarly, IP + addresses of the IKE endpoints are generally not included in the IKE + payloads because the payloads are cryptographically protected and + could not be transparently modified by NATs. + + Port 4500 is reserved for UDP-encapsulated ESP and IKE. When working + through a NAT, it is generally better to pass IKE packets over port + 4500 because some older NATs handle IKE traffic on port 500 cleverly + in an attempt to transparently establish IPsec connections between + endpoints that don't handle NAT traversal themselves. Such NATs may + interfere with the straightforward NAT traversal envisioned by this + document. {{ Clarif-7.6 }} An IPsec endpoint that discovers a NAT + + + +Hoffman Expires July 5, 2006 [Page 51] + +Internet-Draft IKEv2 January 2006 + + + between it and its correspondent MUST send all subsequent traffic + from port 4500, which NATs should not treat specially (as they might + with port 500). + + The specific requirements for supporting NAT traversal [NATREQ] are + listed below. Support for NAT traversal is optional. In this + section only, requirements listed as MUST apply only to + implementations supporting NAT traversal. + + o IKE MUST listen on port 4500 as well as port 500. IKE MUST + respond to the IP address and port from which packets arrived. + + o Both IKE initiator and responder MUST include in their IKE_SA_INIT + packets Notify payloads of type NAT_DETECTION_SOURCE_IP and + NAT_DETECTION_DESTINATION_IP. Those payloads can be used to + detect if there is NAT between the hosts, and which end is behind + the NAT. The location of the payloads in the IKE_SA_INIT packets + are just after the Ni and Nr payloads (before the optional CERTREQ + payload). + + o If none of the NAT_DETECTION_SOURCE_IP payload(s) received matches + the hash of the source IP and port found from the IP header of the + packet containing the payload, it means that the other end is + behind NAT (i.e., someone along the route changed the source + address of the original packet to match the address of the NAT + box). In this case, this end should allow dynamic update of the + other ends IP address, as described later. + + o If the NAT_DETECTION_DESTINATION_IP payload received does not + match the hash of the destination IP and port found from the IP + header of the packet containing the payload, it means that this + end is behind a NAT. In this case, this end SHOULD start sending + keepalive packets as explained in [UDPENCAPS]. + + o The IKE initiator MUST check these payloads if present and if they + do not match the addresses in the outer packet MUST tunnel all + future IKE and ESP packets associated with this IKE_SA over UDP + port 4500. + + o To tunnel IKE packets over UDP port 4500, the IKE header has four + octets of zero prepended and the result immediately follows the + UDP header. To tunnel ESP packets over UDP port 4500, the ESP + header immediately follows the UDP header. Since the first four + bytes of the ESP header contain the SPI, and the SPI cannot + validly be zero, it is always possible to distinguish ESP and IKE + messages. + + + + + +Hoffman Expires July 5, 2006 [Page 52] + +Internet-Draft IKEv2 January 2006 + + + o The original source and destination IP address required for the + transport mode TCP and UDP packet checksum fixup (see [UDPENCAPS]) + are obtained from the Traffic Selectors associated with the + exchange. In the case of NAT traversal, the Traffic Selectors + MUST contain exactly one IP address, which is then used as the + original IP address. + + o There are cases where a NAT box decides to remove mappings that + are still alive (for example, the keepalive interval is too long, + or the NAT box is rebooted). To recover in these cases, hosts + that are not behind a NAT SHOULD send all packets (including + retransmission packets) to the IP address and port from the last + valid authenticated packet from the other end (i.e., dynamically + update the address). {{ Promoted the SHOULD }} A host behind a NAT + MUST NOT do this because it opens a DoS attack possibility. Any + authenticated IKE packet or any authenticated UDP-encapsulated ESP + packet can be used to detect that the IP address or the port has + changed. + + Note that similar but probably not identical actions will likely be + needed to make IKE work with Mobile IP, but such processing is not + addressed by this document. + +2.24. Explicit Congestion Notification (ECN) + + When IPsec tunnels behave as originally specified in [IPSECARCH-OLD], + ECN usage is not appropriate for the outer IP headers because tunnel + decapsulation processing discards ECN congestion indications to the + detriment of the network. ECN support for IPsec tunnels for IKEv1- + based IPsec requires multiple operating modes and negotiation (see + [ECN]). IKEv2 simplifies this situation by requiring that ECN be + usable in the outer IP headers of all tunnel-mode IPsec SAs created + by IKEv2. Specifically, tunnel encapsulators and decapsulators for + all tunnel-mode SAs created by IKEv2 MUST support the ECN full- + functionality option for tunnels specified in [ECN] and MUST + implement the tunnel encapsulation and decapsulation processing + specified in [IPSECARCH] to prevent discarding of ECN congestion + indications. + + +3. Header and Payload Formats + +3.1. The IKE Header + + IKE messages use UDP ports 500 and/or 4500, with one IKE message per + UDP datagram. Information from the beginning of the packet through + the UDP header is largely ignored except that the IP addresses and + UDP ports from the headers are reversed and used for return packets. + + + +Hoffman Expires July 5, 2006 [Page 53] + +Internet-Draft IKEv2 January 2006 + + + When sent on UDP port 500, IKE messages begin immediately following + the UDP header. When sent on UDP port 4500, IKE messages have + prepended four octets of zero. These four octets of zero are not + part of the IKE message and are not included in any of the length + fields or checksums defined by IKE. Each IKE message begins with the + IKE header, denoted HDR in this memo. Following the header are one + or more IKE payloads each identified by a "Next Payload" field in the + preceding payload. Payloads are processed in the order in which they + appear in an IKE message by invoking the appropriate processing + routine according to the "Next Payload" field in the IKE header and + subsequently according to the "Next Payload" field in the IKE payload + itself until a "Next Payload" field of zero indicates that no + payloads follow. If a payload of type "Encrypted" is found, that + payload is decrypted and its contents parsed as additional payloads. + An Encrypted payload MUST be the last payload in a packet and an + Encrypted payload MUST NOT contain another Encrypted payload. + + The Recipient SPI in the header identifies an instance of an IKE + security association. It is therefore possible for a single instance + of IKE to multiplex distinct sessions with multiple peers. + + All multi-octet fields representing integers are laid out in big + endian order (aka most significant byte first, or network byte + order). + + The format of the IKE header is shown in Figure 4. + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! IKE_SA Initiator's SPI ! + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! IKE_SA Responder's SPI ! + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload ! MjVer ! MnVer ! Exchange Type ! Flags ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Message ID ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 4: IKE Header Format + + o Initiator's SPI (8 octets) - A value chosen by the initiator to + identify a unique IKE security association. This value MUST NOT + be zero. + + + +Hoffman Expires July 5, 2006 [Page 54] + +Internet-Draft IKEv2 January 2006 + + + o Responder's SPI (8 octets) - A value chosen by the responder to + identify a unique IKE security association. This value MUST be + zero in the first message of an IKE Initial Exchange (including + repeats of that message including a cookie). {{ The phrase "and + MUST NOT be zero in any other message" was removed; Clarif-2.1 }} + + o Next Payload (1 octet) - Indicates the type of payload that + immediately follows the header. The format and value of each + payload are defined below. + + o Major Version (4 bits) - Indicates the major version of the IKE + protocol in use. Implementations based on this version of IKE + MUST set the Major Version to 2. Implementations based on + previous versions of IKE and ISAKMP MUST set the Major Version to + 1. Implementations based on this version of IKE MUST reject or + ignore messages containing a version number greater than 2. + + o Minor Version (4 bits) - Indicates the minor version of the IKE + protocol in use. Implementations based on this version of IKE + MUST set the Minor Version to 0. They MUST ignore the minor + version number of received messages. + + o Exchange Type (1 octet) - Indicates the type of exchange being + used. This constrains the payloads sent in each message and + orderings of messages in an exchange. + + Exchange Type Value + ---------------------------------- + RESERVED 0-33 + IKE_SA_INIT 34 + IKE_AUTH 35 + CREATE_CHILD_SA 36 + INFORMATIONAL 37 + RESERVED TO IANA 38-239 + Reserved for private use 240-255 + + o Flags (1 octet) - Indicates specific options that are set for the + message. Presence of options are indicated by the appropriate bit + in the flags field being set. The bits are defined LSB first, so + bit 0 would be the least significant bit of the Flags octet. In + the description below, a bit being 'set' means its value is '1', + while 'cleared' means its value is '0'. + + * X(reserved) (bits 0-2) - These bits MUST be cleared when + sending and MUST be ignored on receipt. + + * I(nitiator) (bit 3 of Flags) - This bit MUST be set in messages + sent by the original initiator of the IKE_SA and MUST be + + + +Hoffman Expires July 5, 2006 [Page 55] + +Internet-Draft IKEv2 January 2006 + + + cleared in messages sent by the original responder. It is used + by the recipient to determine which eight octets of the SPI + were generated by the recipient. + + * V(ersion) (bit 4 of Flags) - This bit indicates that the + transmitter is capable of speaking a higher major version + number of the protocol than the one indicated in the major + version number field. Implementations of IKEv2 must clear this + bit when sending and MUST ignore it in incoming messages. + + * R(esponse) (bit 5 of Flags) - This bit indicates that this + message is a response to a message containing the same message + ID. This bit MUST be cleared in all request messages and MUST + be set in all responses. An IKE endpoint MUST NOT generate a + response to a message that is marked as being a response. + + * X(reserved) (bits 6-7 of Flags) - These bits MUST be cleared + when sending and MUST be ignored on receipt. + + o Message ID (4 octets) - Message identifier used to control + retransmission of lost packets and matching of requests and + responses. It is essential to the security of the protocol + because it is used to prevent message replay attacks. See + Section 2.1 and Section 2.2. + + o Length (4 octets) - Length of total message (header + payloads) in + octets. + +3.2. Generic Payload Header + + Each IKE payload defined in Section 3.3 through Section 3.16 begins + with a generic payload header, shown in Figure 5. Figures for each + payload below will include the generic payload header, but for + brevity the description of each field will be omitted. + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 5: Generic Payload Header + + The Generic Payload Header fields are defined as follows: + + o Next Payload (1 octet) - Identifier for the payload type of the + next payload in the message. If the current payload is the last + in the message, then this field will be 0. This field provides a + + + +Hoffman Expires July 5, 2006 [Page 56] + +Internet-Draft IKEv2 January 2006 + + + "chaining" capability whereby additional payloads can be added to + a message by appending it to the end of the message and setting + the "Next Payload" field of the preceding payload to indicate the + new payload's type. An Encrypted payload, which must always be + the last payload of a message, is an exception. It contains data + structures in the format of additional payloads. In the header of + an Encrypted payload, the Next Payload field is set to the payload + type of the first contained payload (instead of 0). The payload + type values are: + + Next Payload Type Notation Value + -------------------------------------------------- + No Next Payload 0 + RESERVED 1-32 + Security Association SA 33 + Key Exchange KE 34 + Identification - Initiator IDi 35 + Identification - Responder IDr 36 + Certificate CERT 37 + Certificate Request CERTREQ 38 + Authentication AUTH 39 + Nonce Ni, Nr 40 + Notify N 41 + Delete D 42 + Vendor ID V 43 + Traffic Selector - Initiator TSi 44 + Traffic Selector - Responder TSr 45 + Encrypted E 46 + Configuration CP 47 + Extensible Authentication EAP 48 + RESERVED TO IANA 49-127 + PRIVATE USE 128-255 + + (Payload type values 1-32 should not be assigned in the + future so that there is no overlap with the code assignments + for IKEv1.) + + o Critical (1 bit) - MUST be set to zero if the sender wants the + recipient to skip this payload if it does not understand the + payload type code in the Next Payload field of the previous + payload. MUST be set to one if the sender wants the recipient to + reject this entire message if it does not understand the payload + type. MUST be ignored by the recipient if the recipient + understands the payload type code. MUST be set to zero for + payload types defined in this document. Note that the critical + bit applies to the current payload rather than the "next" payload + whose type code appears in the first octet. The reasoning behind + not setting the critical bit for payloads defined in this document + + + +Hoffman Expires July 5, 2006 [Page 57] + +Internet-Draft IKEv2 January 2006 + + + is that all implementations MUST understand all payload types + defined in this document and therefore must ignore the Critical + bit's value. Skipped payloads are expected to have valid Next + Payload and Payload Length fields. + + o RESERVED (7 bits) - MUST be sent as zero; MUST be ignored on + receipt. + + o Payload Length (2 octets) - Length in octets of the current + payload, including the generic payload header. + +3.3. Security Association Payload + + The Security Association Payload, denoted SA in this memo, is used to + negotiate attributes of a security association. Assembly of Security + Association Payloads requires great peace of mind. An SA payload MAY + contain multiple proposals. If there is more than one, they MUST be + ordered from most preferred to least preferred. Each proposal may + contain multiple IPsec protocols (where a protocol is IKE, ESP, or + AH), each protocol MAY contain multiple transforms, and each + transform MAY contain multiple attributes. When parsing an SA, an + implementation MUST check that the total Payload Length is consistent + with the payload's internal lengths and counts. Proposals, + Transforms, and Attributes each have their own variable length + encodings. They are nested such that the Payload Length of an SA + includes the combined contents of the SA, Proposal, Transform, and + Attribute information. The length of a Proposal includes the lengths + of all Transforms and Attributes it contains. The length of a + Transform includes the lengths of all Attributes it contains. + + The syntax of Security Associations, Proposals, Transforms, and + Attributes is based on ISAKMP; however the semantics are somewhat + different. The reason for the complexity and the hierarchy is to + allow for multiple possible combinations of algorithms to be encoded + in a single SA. Sometimes there is a choice of multiple algorithms, + whereas other times there is a combination of algorithms. For + example, an initiator might want to propose using (AH w/MD5 and ESP + w/3DES) OR (ESP w/MD5 and 3DES). + + One of the reasons the semantics of the SA payload has changed from + ISAKMP and IKEv1 is to make the encodings more compact in common + cases. + + The Proposal structure contains within it a Proposal # and an IPsec + protocol ID. Each structure MUST have the same Proposal # as the + previous one or be one (1) greater. The first Proposal MUST have a + Proposal # of one (1). If two successive structures have the same + Proposal number, it means that the proposal consists of the first + + + +Hoffman Expires July 5, 2006 [Page 58] + +Internet-Draft IKEv2 January 2006 + + + structure AND the second. So a proposal of AH AND ESP would have two + proposal structures, one for AH and one for ESP and both would have + Proposal #1. A proposal of AH OR ESP would have two proposal + structures, one for AH with Proposal #1 and one for ESP with Proposal + #2. + + Each Proposal/Protocol structure is followed by one or more transform + structures. The number of different transforms is generally + determined by the Protocol. AH generally has a single transform: an + integrity check algorithm. ESP generally has two: an encryption + algorithm and an integrity check algorithm. IKE generally has four + transforms: a Diffie-Hellman group, an integrity check algorithm, a + prf algorithm, and an encryption algorithm. If an algorithm that + combines encryption and integrity protection is proposed, it MUST be + proposed as an encryption algorithm and an integrity protection + algorithm MUST NOT be proposed. For each Protocol, the set of + permissible transforms is assigned transform ID numbers, which appear + in the header of each transform. + + If there are multiple transforms with the same Transform Type, the + proposal is an OR of those transforms. If there are multiple + Transforms with different Transform Types, the proposal is an AND of + the different groups. For example, to propose ESP with (3DES or + IDEA) and (HMAC_MD5 or HMAC_SHA), the ESP proposal would contain two + Transform Type 1 candidates (one for 3DES and one for IDEA) and two + Transform Type 2 candidates (one for HMAC_MD5 and one for HMAC_SHA). + This effectively proposes four combinations of algorithms. If the + initiator wanted to propose only a subset of those, for example (3DES + and HMAC_MD5) or (IDEA and HMAC_SHA), there is no way to encode that + as multiple transforms within a single Proposal. Instead, the + initiator would have to construct two different Proposals, each with + two transforms. + + A given transform MAY have one or more Attributes. Attributes are + necessary when the transform can be used in more than one way, as + when an encryption algorithm has a variable key size. The transform + would specify the algorithm and the attribute would specify the key + size. Most transforms do not have attributes. A transform MUST NOT + have multiple attributes of the same type. To propose alternate + values for an attribute (for example, multiple key sizes for the AES + encryption algorithm), and implementation MUST include multiple + Transforms with the same Transform Type each with a single Attribute. + + Note that the semantics of Transforms and Attributes are quite + different from those in IKEv1. In IKEv1, a single Transform carried + multiple algorithms for a protocol with one carried in the Transform + and the others carried in the Attributes. + + + + +Hoffman Expires July 5, 2006 [Page 59] + +Internet-Draft IKEv2 January 2006 + + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ <Proposals> ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 6: Security Association Payload + + o Proposals (variable) - One or more proposal substructures. + + The payload type for the Security Association Payload is thirty three + (33). + +3.3.1. Proposal Substructure + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! 0 (last) or 2 ! RESERVED ! Proposal Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Proposal # ! Protocol ID ! SPI Size !# of Transforms! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ~ SPI (variable) ~ + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ <Transforms> ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 7: Proposal Substructure + + o 0 (last) or 2 (more) (1 octet) - Specifies whether this is the + last Proposal Substructure in the SA. This syntax is inherited + from ISAKMP, but is unnecessary because the last Proposal could be + identified from the length of the SA. The value (2) corresponds + to a Payload Type of Proposal in IKEv1, and the first four octets + of the Proposal structure are designed to look somewhat like the + header of a Payload. + + o RESERVED (1 octet) - MUST be sent as zero; MUST be ignored on + receipt. + + o Proposal Length (2 octets) - Length of this proposal, including + all transforms and attributes that follow. + + + +Hoffman Expires July 5, 2006 [Page 60] + +Internet-Draft IKEv2 January 2006 + + + o Proposal # (1 octet) - When a proposal is made, the first proposal + in an SA payload MUST be #1, and subsequent proposals MUST either + be the same as the previous proposal (indicating an AND of the two + proposals) or one more than the previous proposal (indicating an + OR of the two proposals). When a proposal is accepted, all of the + proposal numbers in the SA payload MUST be the same and MUST match + the number on the proposal sent that was accepted. + + o Protocol ID (1 octet) - Specifies the IPsec protocol identifier + for the current negotiation. The defined values are: + + Protocol Protocol ID + ----------------------------------- + RESERVED 0 + IKE 1 + AH 2 + ESP 3 + RESERVED TO IANA 4-200 + PRIVATE USE 201-255 + + o SPI Size (1 octet) - For an initial IKE_SA negotiation, this field + MUST be zero; the SPI is obtained from the outer header. During + subsequent negotiations, it is equal to the size, in octets, of + the SPI of the corresponding protocol (8 for IKE, 4 for ESP and + AH). + + o # of Transforms (1 octet) - Specifies the number of transforms in + this proposal. + + o SPI (variable) - The sending entity's SPI. Even if the SPI Size + is not a multiple of 4 octets, there is no padding applied to the + payload. When the SPI Size field is zero, this field is not + present in the Security Association payload. + + o Transforms (variable) - One or more transform substructures. + + + + + + + + + + + + + + + + +Hoffman Expires July 5, 2006 [Page 61] + +Internet-Draft IKEv2 January 2006 + + +3.3.2. Transform Substructure + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! 0 (last) or 3 ! RESERVED ! Transform Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + !Transform Type ! RESERVED ! Transform ID ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Transform Attributes ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 8: Transform Substructure + + o 0 (last) or 3 (more) (1 octet) - Specifies whether this is the + last Transform Substructure in the Proposal. This syntax is + inherited from ISAKMP, but is unnecessary because the last + Proposal could be identified from the length of the SA. The value + (3) corresponds to a Payload Type of Transform in IKEv1, and the + first four octets of the Transform structure are designed to look + somewhat like the header of a Payload. + + o RESERVED - MUST be sent as zero; MUST be ignored on receipt. + + o Transform Length - The length (in octets) of the Transform + Substructure including Header and Attributes. + + o Transform Type (1 octet) - The type of transform being specified + in this transform. Different protocols support different + transform types. For some protocols, some of the transforms may + be optional. If a transform is optional and the initiator wishes + to propose that the transform be omitted, no transform of the + given type is included in the proposal. If the initiator wishes + to make use of the transform optional to the responder, it + includes a transform substructure with transform ID = 0 as one of + the options. + + o Transform ID (2 octets) - The specific instance of the transform + type being proposed. + + The tranform type values are: + + + + + + + + +Hoffman Expires July 5, 2006 [Page 62] + +Internet-Draft IKEv2 January 2006 + + + Description Trans. Used In + Type + ------------------------------------------------------------------ + RESERVED 0 + Encryption Algorithm (ENCR) 1 IKE and ESP + Pseudo-random Function (PRF) 2 IKE + Integrity Algorithm (INTEG) 3 IKE, AH, optional in ESP + Diffie-Hellman Group (D-H) 4 IKE, optional in AH & ESP + Extended Sequence Numbers (ESN) 5 AH and ESP + RESERVED TO IANA 6-240 + PRIVATE USE 241-255 + + For Transform Type 1 (Encryption Algorithm), defined Transform IDs + are: + + Name Number Defined In + --------------------------------------------------- + RESERVED 0 + ENCR_DES_IV64 1 (RFC1827) + ENCR_DES 2 (RFC2405), [DES] + ENCR_3DES 3 (RFC2451) + ENCR_RC5 4 (RFC2451) + ENCR_IDEA 5 (RFC2451), [IDEA] + ENCR_CAST 6 (RFC2451) + ENCR_BLOWFISH 7 (RFC2451) + ENCR_3IDEA 8 (RFC2451) + ENCR_DES_IV32 9 + RESERVED 10 + ENCR_NULL 11 (RFC2410) + ENCR_AES_CBC 12 (RFC3602) + ENCR_AES_CTR 13 (RFC3664) + RESERVED TO IANA 14-1023 + PRIVATE USE 1024-65535 + + For Transform Type 2 (Pseudo-random Function), defined Transform IDs + are: + + Name Number Defined In + ------------------------------------------------------ + RESERVED 0 + PRF_HMAC_MD5 1 (RFC2104), [MD5] + PRF_HMAC_SHA1 2 (RFC2104), [SHA] + PRF_HMAC_TIGER 3 (RFC2104) + PRF_AES128_XCBC 4 (RFC3664) + RESERVED TO IANA 5-1023 + PRIVATE USE 1024-65535 + + For Transform Type 3 (Integrity Algorithm), defined Transform IDs + + + +Hoffman Expires July 5, 2006 [Page 63] + +Internet-Draft IKEv2 January 2006 + + + are: + + Name Number Defined In + ---------------------------------------- + NONE 0 + AUTH_HMAC_MD5_96 1 (RFC2403) + AUTH_HMAC_SHA1_96 2 (RFC2404) + AUTH_DES_MAC 3 + AUTH_KPDK_MD5 4 (RFC1826) + AUTH_AES_XCBC_96 5 (RFC3566) + RESERVED TO IANA 6-1023 + PRIVATE USE 1024-65535 + + For Transform Type 4 (Diffie-Hellman Group), defined Transform IDs + are: + + Name Number + -------------------------------------- + NONE 0 + Defined in Appendix B 1 - 2 + RESERVED 3 - 4 + Defined in [ADDGROUP] 5 + RESERVED TO IANA 6 - 13 + Defined in [ADDGROUP] 14 - 18 + RESERVED TO IANA 19 - 1023 + PRIVATE USE 1024-65535 + + For Transform Type 5 (Extended Sequence Numbers), defined Transform + IDs are: + + Name Number + -------------------------------------------- + No Extended Sequence Numbers 0 + Extended Sequence Numbers 1 + RESERVED 2 - 65535 + +3.3.3. Valid Transform Types by Protocol + + The number and type of transforms that accompany an SA payload are + dependent on the protocol in the SA itself. An SA payload proposing + the establishment of an SA has the following mandatory and optional + transform types. A compliant implementation MUST understand all + mandatory and optional types for each protocol it supports (though it + need not accept proposals with unacceptable suites). A proposal MAY + omit the optional types if the only value for them it will accept is + NONE. + + + + + +Hoffman Expires July 5, 2006 [Page 64] + +Internet-Draft IKEv2 January 2006 + + + Protocol Mandatory Types Optional Types + --------------------------------------------------- + IKE ENCR, PRF, INTEG, D-H + ESP ENCR, ESN INTEG, D-H + AH INTEG, ESN D-H + +3.3.4. Mandatory Transform IDs + + The specification of suites that MUST and SHOULD be supported for + interoperability has been removed from this document because they are + likely to change more rapidly than this document evolves. + + An important lesson learned from IKEv1 is that no system should only + implement the mandatory algorithms and expect them to be the best + choice for all customers. For example, at the time that this + document was written, many IKEv1 implementers were starting to + migrate to AES in Cipher Block Chaining (CBC) mode for Virtual + Private Network (VPN) applications. Many IPsec systems based on + IKEv2 will implement AES, additional Diffie-Hellman groups, and + additional hash algorithms, and some IPsec customers already require + these algorithms in addition to the ones listed above. + + It is likely that IANA will add additional transforms in the future, + and some users may want to use private suites, especially for IKE + where implementations should be capable of supporting different + parameters, up to certain size limits. In support of this goal, all + implementations of IKEv2 SHOULD include a management facility that + allows specification (by a user or system administrator) of Diffie- + Hellman (DH) parameters (the generator, modulus, and exponent lengths + and values) for new DH groups. Implementations SHOULD provide a + management interface through which these parameters and the + associated transform IDs may be entered (by a user or system + administrator), to enable negotiating such groups. + + All implementations of IKEv2 MUST include a management facility that + enables a user or system administrator to specify the suites that are + acceptable for use with IKE. Upon receipt of a payload with a set of + transform IDs, the implementation MUST compare the transmitted + transform IDs against those locally configured via the management + controls, to verify that the proposed suite is acceptable based on + local policy. The implementation MUST reject SA proposals that are + not authorized by these IKE suite controls. Note that cryptographic + suites that MUST be implemented need not be configured as acceptable + to local policy. + + + + + + + +Hoffman Expires July 5, 2006 [Page 65] + +Internet-Draft IKEv2 January 2006 + + +3.3.5. Transform Attributes + + Each transform in a Security Association payload may include + attributes that modify or complete the specification of the + transform. These attributes are type/value pairs and are defined + below. For example, if an encryption algorithm has a variable-length + key, the key length to be used may be specified as an attribute. + Attributes can have a value with a fixed two octet length or a + variable-length value. For the latter, the attribute is encoded as + type/length/value. + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + !A! Attribute Type ! AF=0 Attribute Length ! + !F! ! AF=1 Attribute Value ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! AF=0 Attribute Value ! + ! AF=1 Not Transmitted ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 9: Data Attributes + + o Attribute Type (2 octets) - Unique identifier for each type of + attribute (see below). The most significant bit of this field is + the Attribute Format bit (AF). It indicates whether the data + attributes follow the Type/Length/Value (TLV) format or a + shortened Type/Value (TV) format. If the AF bit is zero (0), then + the Data Attributes are of the Type/Length/Value (TLV) form. If + the AF bit is a one (1), then the Data Attributes are of the Type/ + Value form. + + o Attribute Length (2 octets) - Length in octets of the Attribute + Value. When the AF bit is a one (1), the Attribute Value is only + 2 octets and the Attribute Length field is not present. + + o Attribute Value (variable length) - Value of the Attribute + associated with the Attribute Type. If the AF bit is a zero (0), + this field has a variable length defined by the Attribute Length + field. If the AF bit is a one (1), the Attribute Value has a + length of 2 octets. + + o Key Length - When using an Encryption Algorithm that has a + variable-length key, this attribute specifies the key length in + bits (MUST use network byte order). This attribute MUST NOT be + used when the specified Encryption Algorithm uses a fixed-length + key. + + + + +Hoffman Expires July 5, 2006 [Page 66] + +Internet-Draft IKEv2 January 2006 + + + Note that only a single attribute type (Key Length) is defined, and + it is fixed length. The variable-length encoding specification is + included only for future extensions. {{ Clarif-7.11 removed the + sentence that listed, incorrectly, the algorithms defined in the + document that accept attributes. }} + + Attributes described as basic MUST NOT be encoded using the variable- + length encoding. Variable-length attributes MUST NOT be encoded as + basic even if their value can fit into two octets. NOTE: This is a + change from IKEv1, where increased flexibility may have simplified + the composer of messages but certainly complicated the parser. + + Attribute Type Value Attribute Format + ------------------------------------------------------------ + RESERVED 0-13 + Key Length (in bits) 14 TV + RESERVED 15-17 + RESERVED TO IANA 18-16383 + PRIVATE USE 16384-32767 + Values 0-13 and 15-17 were used in a similar context in + IKEv1, and should not be assigned except to matching values. + +3.3.6. Attribute Negotiation + + During security association negotiation initiators present offers to + responders. Responders MUST select a single complete set of + parameters from the offers (or reject all offers if none are + acceptable). If there are multiple proposals, the responder MUST + choose a single proposal number and return all of the Proposal + substructures with that Proposal number. If there are multiple + Transforms with the same type, the responder MUST choose a single + one. Any attributes of a selected transform MUST be returned + unmodified. The initiator of an exchange MUST check that the + accepted offer is consistent with one of its proposals, and if not + that response MUST be rejected. + + Negotiating Diffie-Hellman groups presents some special challenges. + SA offers include proposed attributes and a Diffie-Hellman public + number (KE) in the same message. If in the initial exchange the + initiator offers to use one of several Diffie-Hellman groups, it + SHOULD pick the one the responder is most likely to accept and + include a KE corresponding to that group. If the guess turns out to + be wrong, the responder will indicate the correct group in the + response and the initiator SHOULD pick an element of that group for + its KE value when retrying the first message. It SHOULD, however, + continue to propose its full supported set of groups in order to + prevent a man-in-the-middle downgrade attack. + + + + +Hoffman Expires July 5, 2006 [Page 67] + +Internet-Draft IKEv2 January 2006 + + + Implementation Note: + + Certain negotiable attributes can have ranges or could have multiple + acceptable values. These include the key length of a variable key + length symmetric cipher. To further interoperability and to support + upgrading endpoints independently, implementers of this protocol + SHOULD accept values that they deem to supply greater security. For + instance, if a peer is configured to accept a variable-length cipher + with a key length of X bits and is offered that cipher with a larger + key length, the implementation SHOULD accept the offer if it supports + use of the longer key. + + Support of this capability allows an implementation to express a + concept of "at least" a certain level of security-- "a key length of + _at least_ X bits for cipher Y". + +3.4. Key Exchange Payload + + The Key Exchange Payload, denoted KE in this memo, is used to + exchange Diffie-Hellman public numbers as part of a Diffie-Hellman + key exchange. The Key Exchange Payload consists of the IKE generic + payload header followed by the Diffie-Hellman public value itself. + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! DH Group # ! RESERVED ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Key Exchange Data ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 10: Key Exchange Payload Format + + A key exchange payload is constructed by copying one's Diffie-Hellman + public value into the "Key Exchange Data" portion of the payload. + The length of the Diffie-Hellman public value MUST be equal to the + length of the prime modulus over which the exponentiation was + performed, prepending zero bits to the value if necessary. + + The DH Group # identifies the Diffie-Hellman group in which the Key + Exchange Data was computed (see Section 3.3.2). If the selected + proposal uses a different Diffie-Hellman group, the message MUST be + rejected with a Notify payload of type INVALID_KE_PAYLOAD. + + + + +Hoffman Expires July 5, 2006 [Page 68] + +Internet-Draft IKEv2 January 2006 + + + The payload type for the Key Exchange payload is thirty four (34). + +3.5. Identification Payloads + + The Identification Payloads, denoted IDi and IDr in this memo, allow + peers to assert an identity to one another. This identity may be + used for policy lookup, but does not necessarily have to match + anything in the CERT payload; both fields may be used by an + implementation to perform access control decisions. {{ Clarif-7.1 }} + When using the ID_IPV4_ADDR/ID_IPV6_ADDR identity types in IDi/IDr + payloads, IKEv2 does not require this address to match the address in + the IP header of IKEv2 packets, or anything in the TSi/TSr payloads. + The contents of IDi/IDr is used purely to fetch the policy and + authentication data related to the other party. + + NOTE: In IKEv1, two ID payloads were used in each direction to hold + Traffic Selector (TS) information for data passing over the SA. In + IKEv2, this information is carried in TS payloads (see Section 3.13). + + The Identification Payload consists of the IKE generic payload header + followed by identification fields as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ID Type ! RESERVED | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Identification Data ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 11: Identification Payload Format + + o ID Type (1 octet) - Specifies the type of Identification being + used. + + o RESERVED - MUST be sent as zero; MUST be ignored on receipt. + + o Identification Data (variable length) - Value, as indicated by the + Identification Type. The length of the Identification Data is + computed from the size in the ID payload header. + + The payload types for the Identification Payload are thirty five (35) + for IDi and thirty six (36) for IDr. + + + + +Hoffman Expires July 5, 2006 [Page 69] + +Internet-Draft IKEv2 January 2006 + + + The following table lists the assigned values for the Identification + Type field: + + ID Type Value + ------------------------------------------------------------------- + RESERVED 0 + + ID_IPV4_ADDR 1 + A single four (4) octet IPv4 address. + + ID_FQDN 2 + A fully-qualified domain name string. An example of a ID_FQDN + is, "example.com". The string MUST not contain any terminators + (e.g., NULL, CR, etc.). + + ID_RFC822_ADDR 3 + A fully-qualified RFC822 email address string, An example of a + ID_RFC822_ADDR is, "jsmith@example.com". The string MUST not + contain any terminators. + + RESERVED TO IANA 4 + + ID_IPV6_ADDR 5 + A single sixteen (16) octet IPv6 address. + + RESERVED TO IANA 6 - 8 + + ID_DER_ASN1_DN 9 + The binary Distinguished Encoding Rules (DER) encoding of an + ASN.1 X.500 Distinguished Name [X.501]. + + ID_DER_ASN1_GN 10 + The binary DER encoding of an ASN.1 X.500 GeneralName [X.509]. + + ID_KEY_ID 11 + An opaque octet stream which may be used to pass vendor- + specific information necessary to do certain proprietary + types of identification. + + RESERVED TO IANA 12-200 + + PRIVATE USE 201-255 + + Two implementations will interoperate only if each can generate a + type of ID acceptable to the other. To assure maximum + interoperability, implementations MUST be configurable to send at + least one of ID_IPV4_ADDR, ID_FQDN, ID_RFC822_ADDR, or ID_KEY_ID, and + MUST be configurable to accept all of these types. Implementations + + + +Hoffman Expires July 5, 2006 [Page 70] + +Internet-Draft IKEv2 January 2006 + + + SHOULD be capable of generating and accepting all of these types. + IPv6-capable implementations MUST additionally be configurable to + accept ID_IPV6_ADDR. IPv6-only implementations MAY be configurable + to send only ID_IPV6_ADDR. + + {{ Clarif-3.4 }} EAP [EAP] does not mandate the use of any particular + type of identifier, but often EAP is used with Network Access + Identifiers (NAIs) defined in [NAI]. Although NAIs look a bit like + email addresses (e.g., "joe@example.com"), the syntax is not exactly + the same as the syntax of email address in [MAILFORMAT]. For those + NAIs that include the realm component, the ID_RFC822_ADDR + identification type SHOULD be used. Responder implementations should + not attempt to verify that the contents actually conform to the exact + syntax given in [MAILFORMAT], but instead should accept any + reasonable-looking NAI. For NAIs that do not include the realm + component,the ID_KEY_ID identification type SHOULD be used. + +3.6. Certificate Payload + + The Certificate Payload, denoted CERT in this memo, provides a means + to transport certificates or other authentication-related information + via IKE. Certificate payloads SHOULD be included in an exchange if + certificates are available to the sender unless the peer has + indicated an ability to retrieve this information from elsewhere + using an HTTP_CERT_LOOKUP_SUPPORTED Notify payload. Note that the + term "Certificate Payload" is somewhat misleading, because not all + authentication mechanisms use certificates and data other than + certificates may be passed in this payload. + + The Certificate Payload is defined as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Cert Encoding ! ! + +-+-+-+-+-+-+-+-+ ! + ~ Certificate Data ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 12: Certificate Payload Format + + o Certificate Encoding (1 octet) - This field indicates the type of + certificate or certificate-related information contained in the + Certificate Data field. + + + + +Hoffman Expires July 5, 2006 [Page 71] + +Internet-Draft IKEv2 January 2006 + + + Certificate Encoding Value + ------------------------------------------------- + RESERVED 0 + PKCS #7 wrapped X.509 certificate 1 + PGP Certificate 2 + DNS Signed Key 3 + X.509 Certificate - Signature 4 + Kerberos Token 6 + Certificate Revocation List (CRL) 7 + Authority Revocation List (ARL) 8 + SPKI Certificate 9 + X.509 Certificate - Attribute 10 + Raw RSA Key 11 + Hash and URL of X.509 certificate 12 + Hash and URL of X.509 bundle 13 + RESERVED to IANA 14 - 200 + PRIVATE USE 201 - 255 + + o Certificate Data (variable length) - Actual encoding of + certificate data. The type of certificate is indicated by the + Certificate Encoding field. + + The payload type for the Certificate Payload is thirty seven (37). + + Specific syntax is for some of the certificate type codes above is + not defined in this document. The types whose syntax is defined in + this document are: + + o X.509 Certificate - Signature (4) contains a DER encoded X.509 + certificate whose public key is used to validate the sender's AUTH + payload. + + o Certificate Revocation List (7) contains a DER encoded X.509 + certificate revocation list. + + o {{ Added "DER-encoded RSAPublicKey structure" from Clarif-3.7 }} + Raw RSA Key (11) contains a PKCS #1 encoded RSA key, that is, a + DER-encoded RSAPublicKey structure (see [RSA] and [PKCS1]). + + o Hash and URL encodings (12-13) allow IKE messages to remain short + by replacing long data structures with a 20 octet SHA-1 hash (see + [SHA]) of the replaced value followed by a variable-length URL + that resolves to the DER encoded data structure itself. This + improves efficiency when the endpoints have certificate data + cached and makes IKE less subject to denial of service attacks + that become easier to mount when IKE messages are large enough to + require IP fragmentation [DOSUDPPROT]. + + + + +Hoffman Expires July 5, 2006 [Page 72] + +Internet-Draft IKEv2 January 2006 + + + Use the following ASN.1 definition for an X.509 bundle: + + CertBundle + { iso(1) identified-organization(3) dod(6) internet(1) + security(5) mechanisms(5) pkix(7) id-mod(0) + id-mod-cert-bundle(34) } + + DEFINITIONS EXPLICIT TAGS ::= + BEGIN + + IMPORTS + Certificate, CertificateList + FROM PKIX1Explicit88 + { iso(1) identified-organization(3) dod(6) + internet(1) security(5) mechanisms(5) pkix(7) + id-mod(0) id-pkix1-explicit(18) } ; + + CertificateOrCRL ::= CHOICE { + cert [0] Certificate, + crl [1] CertificateList } + + CertificateBundle ::= SEQUENCE OF CertificateOrCRL + + END + + Implementations MUST be capable of being configured to send and + accept up to four X.509 certificates in support of authentication, + and also MUST be capable of being configured to send and accept the + first two Hash and URL formats (with HTTP URLs). Implementations + SHOULD be capable of being configured to send and accept Raw RSA + keys. If multiple certificates are sent, the first certificate MUST + contain the public key used to sign the AUTH payload. The other + certificates may be sent in any order. + + {{ Clarif-3.7 }} Because the contents and use of some of the + certificate types are not defined, they SHOULD NOT be used. In + specific, implementations SHOULD NOT use the following types unless + they are later defined in a standards-track document: + + PKCS #7 wrapped X.509 certificate 1 + PGP Certificate 2 + DNS Signed Key 3 + Kerberos Token 6 + SPKI Certificate 9 + + + + + + + +Hoffman Expires July 5, 2006 [Page 73] + +Internet-Draft IKEv2 January 2006 + + +3.7. Certificate Request Payload + + The Certificate Request Payload, denoted CERTREQ in this memo, + provides a means to request preferred certificates via IKE and can + appear in the IKE_INIT_SA response and/or the IKE_AUTH request. + Certificate Request payloads MAY be included in an exchange when the + sender needs to get the certificate of the receiver. If multiple CAs + are trusted and the cert encoding does not allow a list, then + multiple Certificate Request payloads SHOULD be transmitted. + + The Certificate Request Payload is defined as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Cert Encoding ! ! + +-+-+-+-+-+-+-+-+ ! + ~ Certification Authority ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 13: Certificate Request Payload Format + + o Certificate Encoding (1 octet) - Contains an encoding of the type + or format of certificate requested. Values are listed in + Section 3.6. + + o Certification Authority (variable length) - Contains an encoding + of an acceptable certification authority for the type of + certificate requested. + + The payload type for the Certificate Request Payload is thirty eight + (38). + + The Certificate Encoding field has the same values as those defined + in Section 3.6. The Certification Authority field contains an + indicator of trusted authorities for this certificate type. The + Certification Authority value is a concatenated list of SHA-1 hashes + of the public keys of trusted Certification Authorities (CAs). Each + is encoded as the SHA-1 hash of the Subject Public Key Info element + (see section 4.1.2.7 of [PKIX]) from each Trust Anchor certificate. + The twenty-octet hashes are concatenated and included with no other + formatting. + + {{ Clarif-3.7 }} The contents of the "Certification Authority" field + are defined only for X.509 certificates, which are types 4, 10, 12, + + + +Hoffman Expires July 5, 2006 [Page 74] + +Internet-Draft IKEv2 January 2006 + + + and 13. Other values SHOULD NOT be used until standards-track + specifications that specify their use are published. + + Note that the term "Certificate Request" is somewhat misleading, in + that values other than certificates are defined in a "Certificate" + payload and requests for those values can be present in a Certificate + Request Payload. The syntax of the Certificate Request payload in + such cases is not defined in this document. + + The Certificate Request Payload is processed by inspecting the "Cert + Encoding" field to determine whether the processor has any + certificates of this type. If so, the "Certification Authority" + field is inspected to determine if the processor has any certificates + that can be validated up to one of the specified certification + authorities. This can be a chain of certificates. + + If an end-entity certificate exists that satisfies the criteria + specified in the CERTREQ, a certificate or certificate chain SHOULD + be sent back to the certificate requestor if the recipient of the + CERTREQ: + + o is configured to use certificate authentication, + + o is allowed to send a CERT payload, + + o has matching CA trust policy governing the current negotiation, + and + + o has at least one time-wise and usage appropriate end-entity + certificate chaining to a CA provided in the CERTREQ. + + Certificate revocation checking must be considered during the + chaining process used to select a certificate. Note that even if two + peers are configured to use two different CAs, cross-certification + relationships should be supported by appropriate selection logic. + + The intent is not to prevent communication through the strict + adherence of selection of a certificate based on CERTREQ, when an + alternate certificate could be selected by the sender that would + still enable the recipient to successfully validate and trust it + through trust conveyed by cross-certification, CRLs, or other out-of- + band configured means. Thus, the processing of a CERTREQ should be + seen as a suggestion for a certificate to select, not a mandated one. + If no certificates exist, then the CERTREQ is ignored. This is not + an error condition of the protocol. There may be cases where there + is a preferred CA sent in the CERTREQ, but an alternate might be + acceptable (perhaps after prompting a human operator). + + + + +Hoffman Expires July 5, 2006 [Page 75] + +Internet-Draft IKEv2 January 2006 + + +3.8. Authentication Payload + + The Authentication Payload, denoted AUTH in this memo, contains data + used for authentication purposes. The syntax of the Authentication + data varies according to the Auth Method as specified below. + + The Authentication Payload is defined as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Auth Method ! RESERVED ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Authentication Data ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 14: Authentication Payload Format + + o Auth Method (1 octet) - Specifies the method of authentication + used. Values defined are: + + * RSA Digital Signature (1) - Computed as specified in + Section 2.15 using an RSA private key over a PKCS#1 padded hash + (see [RSA] and [PKCS1]). {{ Clarif-3.2 }} To promote + interoperability, implementations that support this type SHOULD + support signatures that use SHA-1 as the hash function and + SHOULD use SHA-1 as the default hash function when generating + signatures. {{ Clarif-3.3 }} A newer version of PKCS#1 (v2.1) + defines two different encoding methods (ways of "padding the + hash") for signatures. However, IKEv2 and this document point + specifically to the PKCS#1 v2.0 which has only one encoding + method for signatures (EMSA-PKCS1- v1_5). + + * Shared Key Message Integrity Code (2) - Computed as specified + in Section 2.15 using the shared key associated with the + identity in the ID payload and the negotiated prf function + + * DSS Digital Signature (3) - Computed as specified in + Section 2.15 using a DSS private key (see [DSS]) over a SHA-1 + hash. + + * The values 0 and 4-200 are reserved to IANA. The values 201- + 255 are available for private use. + + + + +Hoffman Expires July 5, 2006 [Page 76] + +Internet-Draft IKEv2 January 2006 + + + o Authentication Data (variable length) - see Section 2.15. + + The payload type for the Authentication Payload is thirty nine (39). + +3.9. Nonce Payload + + The Nonce Payload, denoted Ni and Nr in this memo for the initiator's + and responder's nonce respectively, contains random data used to + guarantee liveness during an exchange and protect against replay + attacks. + + The Nonce Payload is defined as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Nonce Data ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 15: Nonce Payload Format + + o Nonce Data (variable length) - Contains the random data generated + by the transmitting entity. + + The payload type for the Nonce Payload is forty (40). + + The size of a Nonce MUST be between 16 and 256 octets inclusive. + Nonce values MUST NOT be reused. + +3.10. Notify Payload + + The Notify Payload, denoted N in this document, is used to transmit + informational data, such as error conditions and state transitions, + to an IKE peer. A Notify Payload may appear in a response message + (usually specifying why a request was rejected), in an INFORMATIONAL + Exchange (to report an error not in an IKE request), or in any other + message to indicate sender capabilities or to modify the meaning of + the request. + + The Notify Payload is defined as follows: + + + + + + + +Hoffman Expires July 5, 2006 [Page 77] + +Internet-Draft IKEv2 January 2006 + + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Protocol ID ! SPI Size ! Notify Message Type ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Security Parameter Index (SPI) ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Notification Data ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 16: Notify Payload Format + + o Protocol ID (1 octet) - If this notification concerns an existing + SA, this field indicates the type of that SA. For IKE_SA + notifications, this field MUST be one (1). For notifications + concerning IPsec SAs this field MUST contain either (2) to + indicate AH or (3) to indicate ESP. {{ Clarif-7.8 }} For + notifications that do not relate to an existing SA, this field + MUST be sent as zero and MUST be ignored on receipt; this is only + true for the INVALID_SELECTORS and REKEY_SA notifications. . All + other values for this field are reserved to IANA for future + assignment. + + o SPI Size (1 octet) - Length in octets of the SPI as defined by the + IPsec protocol ID or zero if no SPI is applicable. For a + notification concerning the IKE_SA, the SPI Size MUST be zero. + + o Notify Message Type (2 octets) - Specifies the type of + notification message. + + o SPI (variable length) - Security Parameter Index. + + o Notification Data (variable length) - Informational or error data + transmitted in addition to the Notify Message Type. Values for + this field are type specific (see below). + + The payload type for the Notify Payload is forty one (41). + +3.10.1. Notify Message Types + + Notification information can be error messages specifying why an SA + could not be established. It can also be status data that a process + + + +Hoffman Expires July 5, 2006 [Page 78] + +Internet-Draft IKEv2 January 2006 + + + managing an SA database wishes to communicate with a peer process. + The table below lists the Notification messages and their + corresponding values. The number of different error statuses was + greatly reduced from IKEv1 both for simplification and to avoid + giving configuration information to probers. + + Types in the range 0 - 16383 are intended for reporting errors. An + implementation receiving a Notify payload with one of these types + that it does not recognize in a response MUST assume that the + corresponding request has failed entirely. {{ Demoted the SHOULD }} + Unrecognized error types in a request and status types in a request + or response MUST be ignored, and they should be logged. + + Notify payloads with status types MAY be added to any message and + MUST be ignored if not recognized. They are intended to indicate + capabilities, and as part of SA negotiation are used to negotiate + non-cryptographic parameters. + + NOTIFY messages: error types Value + ------------------------------------------------------------------- + + RESERVED 0 + + UNSUPPORTED_CRITICAL_PAYLOAD 1 + Sent if the payload has the "critical" bit set and the payload + type is not recognized. Notification Data contains the one-octet + payload type. + + INVALID_IKE_SPI 4 + Indicates an IKE message was received with an unrecognized + destination SPI. This usually indicates that the recipient has + rebooted and forgotten the existence of an IKE_SA. + + INVALID_MAJOR_VERSION 5 + Indicates the recipient cannot handle the version of IKE + specified in the header. The closest version number that the + recipient can support will be in the reply header. + + INVALID_SYNTAX 7 + Indicates the IKE message that was received was invalid because + some type, length, or value was out of range or because the + request was rejected for policy reasons. To avoid a denial of + service attack using forged messages, this status may only be + returned for and in an encrypted packet if the message ID and + cryptographic checksum were valid. To avoid leaking information + to someone probing a node, this status MUST be sent in response + to any error not covered by one of the other status types. + {{ Demoted the SHOULD }} To aid debugging, more detailed error + + + +Hoffman Expires July 5, 2006 [Page 79] + +Internet-Draft IKEv2 January 2006 + + + information should be written to a console or log. + + INVALID_MESSAGE_ID 9 + Sent when an IKE message ID outside the supported window is + received. This Notify MUST NOT be sent in a response; the invalid + request MUST NOT be acknowledged. Instead, inform the other side + by initiating an INFORMATIONAL exchange with Notification data + containing the four octet invalid message ID. Sending this + notification is optional, and notifications of this type MUST be + rate limited. + + INVALID_SPI 11 + MAY be sent in an IKE INFORMATIONAL exchange when a node receives + an ESP or AH packet with an invalid SPI. The Notification Data + contains the SPI of the invalid packet. This usually indicates a + node has rebooted and forgotten an SA. If this Informational + Message is sent outside the context of an IKE_SA, it should only + be used by the recipient as a "hint" that something might be + wrong (because it could easily be forged). + + NO_PROPOSAL_CHOSEN 14 + None of the proposed crypto suites was acceptable. + + INVALID_KE_PAYLOAD 17 + The D-H Group # field in the KE payload is not the group # + selected by the responder for this exchange. There are two octets + of data associated with this notification: the accepted D-H Group + # in big endian order. + + AUTHENTICATION_FAILED 24 + Sent in the response to an IKE_AUTH message when for some reason + the authentication failed. There is no associated data. + + SINGLE_PAIR_REQUIRED 34 + This error indicates that a CREATE_CHILD_SA request is + unacceptable because its sender is only willing to accept traffic + selectors specifying a single pair of addresses. The requestor is + expected to respond by requesting an SA for only the specific + traffic it is trying to forward. + + NO_ADDITIONAL_SAS 35 + This error indicates that a CREATE_CHILD_SA request is + unacceptable because the responder is unwilling to accept any + more CHILD_SAs on this IKE_SA. Some minimal implementations may + only accept a single CHILD_SA setup in the context of an initial + IKE exchange and reject any subsequent attempts to add more. + + INTERNAL_ADDRESS_FAILURE 36 + + + +Hoffman Expires July 5, 2006 [Page 80] + +Internet-Draft IKEv2 January 2006 + + + Indicates an error assigning an internal address (i.e., + INTERNAL_IP4_ADDRESS or INTERNAL_IP6_ADDRESS) during the + processing of a Configuration Payload by a responder. If this + error is generated within an IKE_AUTH exchange, no CHILD_SA will + be created. + + FAILED_CP_REQUIRED 37 + Sent by responder in the case where CP(CFG_REQUEST) was expected + but not received, and so is a conflict with locally configured + policy. There is no associated data. + + TS_UNACCEPTABLE 38 + Indicates that none of the addresses/protocols/ports in the + supplied traffic selectors is acceptable. + + INVALID_SELECTORS 39 + MAY be sent in an IKE INFORMATIONAL exchange when a node receives + an ESP or AH packet whose selectors do not match those of the SA + on which it was delivered (and that caused the packet to be + dropped). The Notification Data contains the start of the + offending packet (as in ICMP messages) and the SPI field of the + notification is set to match the SPI of the IPsec SA. + + RESERVED TO IANA 40-8191 + + PRIVATE USE 8192-16383 + + + NOTIFY messages: status types Value + ------------------------------------------------------------------- + + INITIAL_CONTACT 16384 + This notification asserts that this IKE_SA is the only IKE_SA + currently active between the authenticated identities. It MAY be + sent when an IKE_SA is established after a crash, and the + recipient MAY use this information to delete any other IKE_SAs it + has to the same authenticated identity without waiting for a + timeout. This notification MUST NOT be sent by an entity that may + be replicated (e.g., a roaming user's credentials where the user + is allowed to connect to the corporate firewall from two remote + systems at the same time). {{ Clarif-7.9 }} The INITIAL_CONTACT + notification, if sent, MUST be in the first IKE_AUTH request, + not as a separate exchange afterwards. + + SET_WINDOW_SIZE 16385 + This notification asserts that the sending endpoint is capable of + keeping state for multiple outstanding exchanges, permitting the + recipient to send multiple requests before getting a response to + + + +Hoffman Expires July 5, 2006 [Page 81] + +Internet-Draft IKEv2 January 2006 + + + the first. The data associated with a SET_WINDOW_SIZE + notification MUST be 4 octets long and contain the big endian + representation of the number of messages the sender promises to + keep. Window size is always one until the initial exchanges + complete. + + ADDITIONAL_TS_POSSIBLE 16386 + This notification asserts that the sending endpoint narrowed the + proposed traffic selectors but that other traffic selectors would + also have been acceptable, though only in a separate SA (see + section 2.9). There is no data associated with this Notify type. + It may be sent only as an additional payload in a message + including accepted TSs. + + IPCOMP_SUPPORTED 16387 + This notification may be included only in a message containing an + SA payload negotiating a CHILD_SA and indicates a willingness by + its sender to use IPComp on this SA. The data associated with + this notification includes a two-octet IPComp CPI followed by a + one-octet transform ID optionally followed by attributes whose + length and format are defined by that transform ID. A message + proposing an SA may contain multiple IPCOMP_SUPPORTED + notifications to indicate multiple supported algorithms. A + message accepting an SA may contain at most one. + + The transform IDs currently defined are: + + Name Number Defined In + ------------------------------------- + RESERVED 0 + IPCOMP_OUI 1 + IPCOMP_DEFLATE 2 RFC 2394 + IPCOMP_LZS 3 RFC 2395 + IPCOMP_LZJH 4 RFC 3051 + RESERVED TO IANA 5-240 + PRIVATE USE 241-255 + + NAT_DETECTION_SOURCE_IP 16388 + This notification is used by its recipient to determine whether + the source is behind a NAT box. The data associated with this + notification is a SHA-1 digest of the SPIs (in the order they + appear in the header), IP address, and port on which this packet + was sent. There MAY be multiple Notify payloads of this type in a + message if the sender does not know which of several network + attachments will be used to send the packet. The recipient of + this notification MAY compare the supplied value to a SHA-1 hash + of the SPIs, source IP address, and port, and if they don't match + it SHOULD enable NAT traversal (see section 2.23). Alternately, + + + +Hoffman Expires July 5, 2006 [Page 82] + +Internet-Draft IKEv2 January 2006 + + + it MAY reject the connection attempt if NAT traversal is not + supported. + + NAT_DETECTION_DESTINATION_IP 16389 + This notification is used by its recipient to determine whether + it is behind a NAT box. The data associated with this + notification is a SHA-1 digest of the SPIs (in the order they + appear in the header), IP address, and port to which this packet + was sent. The recipient of this notification MAY compare the + supplied value to a hash of the SPIs, destination IP address, and + port, and if they don't match it SHOULD invoke NAT traversal (see + section 2.23). If they don't match, it means that this end is + behind a NAT and this end SHOULD start sending keepalive packets + as defined in [UDPENCAPS]. Alternately, it MAY reject the + connection attempt if NAT traversal is not supported. + + COOKIE 16390 + This notification MAY be included in an IKE_SA_INIT response. It + indicates that the request should be retried with a copy of this + notification as the first payload. This notification MUST be + included in an IKE_SA_INIT request retry if a COOKIE notification + was included in the initial response. The data associated with + this notification MUST be between 1 and 64 octets in length + (inclusive). + + USE_TRANSPORT_MODE 16391 + This notification MAY be included in a request message that also + includes an SA payload requesting a CHILD_SA. It requests that + the CHILD_SA use transport mode rather than tunnel mode for the + SA created. If the request is accepted, the response MUST also + include a notification of type USE_TRANSPORT_MODE. If the + responder declines the request, the CHILD_SA will be established + in tunnel mode. If this is unacceptable to the initiator, the + initiator MUST delete the SA. Note: Except when using this option + to negotiate transport mode, all CHILD_SAs will use tunnel mode. + + Note: The ECN decapsulation modifications specified in + [IPSECARCH] MUST be performed for every tunnel mode SA created + by IKEv2. + + HTTP_CERT_LOOKUP_SUPPORTED 16392 + This notification MAY be included in any message that can include + a CERTREQ payload and indicates that the sender is capable of + looking up certificates based on an HTTP-based URL (and hence + presumably would prefer to receive certificate specifications in + that format). + + REKEY_SA 16393 + + + +Hoffman Expires July 5, 2006 [Page 83] + +Internet-Draft IKEv2 January 2006 + + + This notification MUST be included in a CREATE_CHILD_SA exchange + if the purpose of the exchange is to replace an existing ESP or + AH SA. The SPI field identifies the SA being rekeyed. + {{ Clarif-5.4 }} The SPI placed in the REKEY_SA + notification is the SPI the exchange initiator would expect in + inbound ESP or AH packets. There is no data. + + ESP_TFC_PADDING_NOT_SUPPORTED 16394 + This notification asserts that the sending endpoint will NOT + accept packets that contain Flow Confidentiality (TFC) padding. + {{ Clarif-4.5 }} The scope of this message is a single + CHILD_SA, and thus this notification is included in messages + containing an SA payload negotiating a CHILD_SA. If neither + endpoint accepts TFC padding, this notification SHOULD be + included in both the request proposing an SA and the response + accepting it. If this notification is included in only one of + the messages, TFC padding can still be sent in the other + direction. + + NON_FIRST_FRAGMENTS_ALSO 16395 + Used for fragmentation control. See [IPSECARCH] for explanation. + {{ Clarif-4.6 }} Sending non-first fragments is + enabled only if NON_FIRST_FRAGMENTS_ALSO notification is + included in both the request proposing an SA and the response + accepting it. If the peer rejects this proposal, the peer only + omits NON_FIRST_FRAGMENTS_ALSO notification from the response, + but does not reject the whole CHILD_SA creation. + + RESERVED TO IANA 16396-40959 + + PRIVATE USE 40960-65535 + +3.11. Delete Payload + + The Delete Payload, denoted D in this memo, contains a protocol + specific security association identifier that the sender has removed + from its security association database and is, therefore, no longer + valid. Figure 17 shows the format of the Delete Payload. It is + possible to send multiple SPIs in a Delete payload; however, each SPI + MUST be for the same protocol. Mixing of protocol identifiers MUST + NOT be performed in the Delete payload. It is permitted, however, to + include multiple Delete payloads in a single INFORMATIONAL exchange + where each Delete payload lists SPIs for a different protocol. + + Deletion of the IKE_SA is indicated by a protocol ID of 1 (IKE) but + no SPIs. Deletion of a CHILD_SA, such as ESP or AH, will contain the + IPsec protocol ID of that protocol (2 for AH, 3 for ESP), and the SPI + is the SPI the sending endpoint would expect in inbound ESP or AH + + + +Hoffman Expires July 5, 2006 [Page 84] + +Internet-Draft IKEv2 January 2006 + + + packets. + + The Delete Payload is defined as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Protocol ID ! SPI Size ! # of SPIs ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Security Parameter Index(es) (SPI) ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 17: Delete Payload Format + + o Protocol ID (1 octet) - Must be 1 for an IKE_SA, 2 for AH, or 3 + for ESP. + + o SPI Size (1 octet) - Length in octets of the SPI as defined by the + protocol ID. It MUST be zero for IKE (SPI is in message header) + or four for AH and ESP. + + o # of SPIs (2 octets) - The number of SPIs contained in the Delete + payload. The size of each SPI is defined by the SPI Size field. + + o Security Parameter Index(es) (variable length) - Identifies the + specific security association(s) to delete. The length of this + field is determined by the SPI Size and # of SPIs fields. + + The payload type for the Delete Payload is forty two (42). + +3.12. Vendor ID Payload + + The Vendor ID Payload, denoted V in this memo, contains a vendor + defined constant. The constant is used by vendors to identify and + recognize remote instances of their implementations. This mechanism + allows a vendor to experiment with new features while maintaining + backward compatibility. + + A Vendor ID payload MAY announce that the sender is capable to + accepting certain extensions to the protocol, or it MAY simply + identify the implementation as an aid in debugging. A Vendor ID + payload MUST NOT change the interpretation of any information defined + in this specification (i.e., the critical bit MUST be set to 0). + Multiple Vendor ID payloads MAY be sent. An implementation is NOT + + + +Hoffman Expires July 5, 2006 [Page 85] + +Internet-Draft IKEv2 January 2006 + + + REQUIRED to send any Vendor ID payload at all. + + A Vendor ID payload may be sent as part of any message. Reception of + a familiar Vendor ID payload allows an implementation to make use of + Private USE numbers described throughout this memo-- private + payloads, private exchanges, private notifications, etc. Unfamiliar + Vendor IDs MUST be ignored. + + Writers of Internet-Drafts who wish to extend this protocol MUST + define a Vendor ID payload to announce the ability to implement the + extension in the Internet-Draft. It is expected that Internet-Drafts + that gain acceptance and are standardized will be given "magic + numbers" out of the Future Use range by IANA, and the requirement to + use a Vendor ID will go away. + + The Vendor ID Payload fields are defined as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Vendor ID (VID) ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 18: Vendor ID Payload Format + + o Vendor ID (variable length) - It is the responsibility of the + person choosing the Vendor ID to assure its uniqueness in spite of + the absence of any central registry for IDs. Good practice is to + include a company name, a person name, or some such. If you want + to show off, you might include the latitude and longitude and time + where you were when you chose the ID and some random input. A + message digest of a long unique string is preferable to the long + unique string itself. + + The payload type for the Vendor ID Payload is forty three (43). + +3.13. Traffic Selector Payload + + The Traffic Selector Payload, denoted TS in this memo, allows peers + to identify packet flows for processing by IPsec security services. + The Traffic Selector Payload consists of the IKE generic payload + header followed by individual traffic selectors as follows: + + + + + +Hoffman Expires July 5, 2006 [Page 86] + +Internet-Draft IKEv2 January 2006 + + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Number of TSs ! RESERVED ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ <Traffic Selectors> ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 19: Traffic Selectors Payload Format + + o Number of TSs (1 octet) - Number of traffic selectors being + provided. + + o RESERVED - This field MUST be sent as zero and MUST be ignored on + receipt. + + o Traffic Selectors (variable length) - One or more individual + traffic selectors. + + The length of the Traffic Selector payload includes the TS header and + all the traffic selectors. + + The payload type for the Traffic Selector payload is forty four (44) + for addresses at the initiator's end of the SA and forty five (45) + for addresses at the responder's end. + + {{ Clarif-4.7 }} There is no requirement that TSi and TSr contain the + same number of individual traffic selectors. Thus, they are + interpreted as follows: a packet matches a given TSi/TSr if it + matches at least one of the individual selectors in TSi, and at least + one of the individual selectors in TSr. + + For instance, the following traffic selectors: + + TSi = ((17, 100, 192.0.1.66-192.0.1.66), + (17, 200, 192.0.1.66-192.0.1.66)) + TSr = ((17, 300, 0.0.0.0-255.255.255.255), + (17, 400, 0.0.0.0-255.255.255.255)) + + would match UDP packets from 192.0.1.66 to anywhere, with any of the + four combinations of source/destination ports (100,300), (100,400), + (200,300), and (200, 400). + + Thus, some types of policies may require several CHILD_SA pairs. For + + + +Hoffman Expires July 5, 2006 [Page 87] + +Internet-Draft IKEv2 January 2006 + + + instance, a policy matching only source/destination ports (100,300) + and (200,400), but not the other two combinations, cannot be + negotiated as a single CHILD_SA pair. + +3.13.1. Traffic Selector + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! TS Type !IP Protocol ID*| Selector Length | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Start Port* | End Port* | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Starting Address* ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Ending Address* ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 20: Traffic Selector + + *Note: All fields other than TS Type and Selector Length depend on + the TS Type. The fields shown are for TS Types 7 and 8, the only two + values currently defined. + + o TS Type (one octet) - Specifies the type of traffic selector. + + o IP protocol ID (1 octet) - Value specifying an associated IP + protocol ID (e.g., UDP/TCP/ICMP). A value of zero means that the + protocol ID is not relevant to this traffic selector-- the SA can + carry all protocols. + + o Selector Length - Specifies the length of this Traffic Selector + Substructure including the header. + + o Start Port (2 octets) - Value specifying the smallest port number + allowed by this Traffic Selector. For protocols for which port is + undefined, or if all ports are allowed, this field MUST be zero. + For the ICMP protocol, the two one-octet fields Type and Code are + treated as a single 16-bit integer (with Type in the most + significant eight bits and Code in the least significant eight + bits) port number for the purposes of filtering based on this + field. + + + + + +Hoffman Expires July 5, 2006 [Page 88] + +Internet-Draft IKEv2 January 2006 + + + o End Port (2 octets) - Value specifying the largest port number + allowed by this Traffic Selector. For protocols for which port is + undefined, or if all ports are allowed, this field MUST be 65535. + For the ICMP protocol, the two one-octet fields Type and Code are + treated as a single 16-bit integer (with Type in the most + significant eight bits and Code in the least significant eight + bits) port number for the purposed of filtering based on this + field. + + o Starting Address - The smallest address included in this Traffic + Selector (length determined by TS type). + + o Ending Address - The largest address included in this Traffic + Selector (length determined by TS type). + + Systems that are complying with [IPSECARCH] that wish to indicate + "ANY" ports MUST set the start port to 0 and the end port to 65535; + note that according to [IPSECARCH], "ANY" includes "OPAQUE". Systems + working with [IPSECARCH] that wish to indicate "OPAQUE" ports, but + not "ANY" ports, MUST set the start port to 65535 and the end port to + 0. + + {{ Added from Clarif-4.8 }} The traffic selector types 7 and 8 can + also refer to ICMP type and code fields. Note, however, that ICMP + packets do not have separate source and destination port fields. The + method for specifying the traffic selectors for ICMP is shown by + example in Section 4.4.1.3 of [IPSECARCH]. + + {{ Added from Clarif-4.9 }} Traffic selectors can use IP Protocol ID + 135 to match the IPv6 mobility header [MIPV6]. This document does + not specify how to represent the "MH Type" field in traffic + selectors, although it is likely that a different document will + specify this in the future. Note that [IPSECARCH] says that the IPv6 + mobility header (MH) message type is placed in the most significant + eight bits of the 16-bit local port selector. The direction + semantics of TSi/TSr port fields are the same as for ICMP. + + The following table lists the assigned values for the Traffic + Selector Type field and the corresponding Address Selector Data. + + + + + + + + + + + + +Hoffman Expires July 5, 2006 [Page 89] + +Internet-Draft IKEv2 January 2006 + + + TS Type Value + ------------------------------------------------------------------- + RESERVED 0-6 + + TS_IPV4_ADDR_RANGE 7 + + A range of IPv4 addresses, represented by two four-octet + values. The first value is the beginning IPv4 address + (inclusive) and the second value is the ending IPv4 address + (inclusive). All addresses falling between the two specified + addresses are considered to be within the list. + + TS_IPV6_ADDR_RANGE 8 + + A range of IPv6 addresses, represented by two sixteen-octet + values. The first value is the beginning IPv6 address + (inclusive) and the second value is the ending IPv6 address + (inclusive). All addresses falling between the two specified + addresses are considered to be within the list. + + RESERVED TO IANA 9-240 + PRIVATE USE 241-255 + +3.14. Encrypted Payload + + The Encrypted Payload, denoted SK{...} or E in this memo, contains + other payloads in encrypted form. The Encrypted Payload, if present + in a message, MUST be the last payload in the message. Often, it is + the only payload in the message. + + The algorithms for encryption and integrity protection are negotiated + during IKE_SA setup, and the keys are computed as specified in + Section 2.14 and Section 2.18. + + The encryption and integrity protection algorithms are modeled after + the ESP algorithms described in RFCs 2104 [HMAC], 4303 [ESP], and + 2451 [ESPCBC]. This document completely specifies the cryptographic + processing of IKE data, but those documents should be consulted for + design rationale. We require a block cipher with a fixed block size + and an integrity check algorithm that computes a fixed-length + checksum over a variable size message. + + The payload type for an Encrypted payload is forty six (46). The + Encrypted Payload consists of the IKE generic payload header followed + by individual fields as follows: + + + + + + +Hoffman Expires July 5, 2006 [Page 90] + +Internet-Draft IKEv2 January 2006 + + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Initialization Vector ! + ! (length is block size for encryption algorithm) ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ~ Encrypted IKE Payloads ~ + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! Padding (0-255 octets) ! + +-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+ + ! ! Pad Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ~ Integrity Checksum Data ~ + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 21: Encrypted Payload Format + + o Next Payload - The payload type of the first embedded payload. + Note that this is an exception in the standard header format, + since the Encrypted payload is the last payload in the message and + therefore the Next Payload field would normally be zero. But + because the content of this payload is embedded payloads and there + was no natural place to put the type of the first one, that type + is placed here. + + o Payload Length - Includes the lengths of the header, IV, Encrypted + IKE Payloads, Padding, Pad Length, and Integrity Checksum Data. + + o Initialization Vector - A randomly chosen value whose length is + equal to the block length of the underlying encryption algorithm. + Recipients MUST accept any value. Senders SHOULD either pick this + value pseudo-randomly and independently for each message or use + the final ciphertext block of the previous message sent. Senders + MUST NOT use the same value for each message, use a sequence of + values with low hamming distance (e.g., a sequence number), or use + ciphertext from a received message. + + o IKE Payloads are as specified earlier in this section. This field + is encrypted with the negotiated cipher. + + o Padding MAY contain any value chosen by the sender, and MUST have + a length that makes the combination of the Payloads, the Padding, + and the Pad Length to be a multiple of the encryption block size. + This field is encrypted with the negotiated cipher. + + + + + +Hoffman Expires July 5, 2006 [Page 91] + +Internet-Draft IKEv2 January 2006 + + + o Pad Length is the length of the Padding field. The sender SHOULD + set the Pad Length to the minimum value that makes the combination + of the Payloads, the Padding, and the Pad Length a multiple of the + block size, but the recipient MUST accept any length that results + in proper alignment. This field is encrypted with the negotiated + cipher. + + o Integrity Checksum Data is the cryptographic checksum of the + entire message starting with the Fixed IKE Header through the Pad + Length. The checksum MUST be computed over the encrypted message. + Its length is determined by the integrity algorithm negotiated. + +3.15. Configuration Payload + + The Configuration payload, denoted CP in this document, is used to + exchange configuration information between IKE peers. The exchange + is for an IRAC to request an internal IP address from an IRAS and to + exchange other information of the sort that one would acquire with + Dynamic Host Configuration Protocol (DHCP) if the IRAC were directly + connected to a LAN. + + Configuration payloads are of type CFG_REQUEST/CFG_REPLY or CFG_SET/ + CFG_ACK (see CFG Type in the payload description below). CFG_REQUEST + and CFG_SET payloads may optionally be added to any IKE request. The + IKE response MUST include either a corresponding CFG_REPLY or CFG_ACK + or a Notify payload with an error type indicating why the request + could not be honored. An exception is that a minimal implementation + MAY ignore all CFG_REQUEST and CFG_SET payloads, so a response + message without a corresponding CFG_REPLY or CFG_ACK MUST be accepted + as an indication that the request was not supported. + + "CFG_REQUEST/CFG_REPLY" allows an IKE endpoint to request information + from its peer. If an attribute in the CFG_REQUEST Configuration + Payload is not zero-length, it is taken as a suggestion for that + attribute. The CFG_REPLY Configuration Payload MAY return that + value, or a new one. It MAY also add new attributes and not include + some requested ones. Requestors MUST ignore returned attributes that + they do not recognize. + + Some attributes MAY be multi-valued, in which case multiple attribute + values of the same type are sent and/or returned. Generally, all + values of an attribute are returned when the attribute is requested. + For some attributes (in this version of the specification only + internal addresses), multiple requests indicates a request that + multiple values be assigned. For these attributes, the number of + values returned SHOULD NOT exceed the number requested. + + If the data type requested in a CFG_REQUEST is not recognized or not + + + +Hoffman Expires July 5, 2006 [Page 92] + +Internet-Draft IKEv2 January 2006 + + + supported, the responder MUST NOT return an error type but rather + MUST either send a CFG_REPLY that MAY be empty or a reply not + containing a CFG_REPLY payload at all. Error returns are reserved + for cases where the request is recognized but cannot be performed as + requested or the request is badly formatted. + + "CFG_SET/CFG_ACK" allows an IKE endpoint to push configuration data + to its peer. In this case, the CFG_SET Configuration Payload + contains attributes the initiator wants its peer to alter. The + responder MUST return a Configuration Payload if it accepted any of + the configuration data and it MUST contain the attributes that the + responder accepted with zero-length data. Those attributes that it + did not accept MUST NOT be in the CFG_ACK Configuration Payload. If + no attributes were accepted, the responder MUST return either an + empty CFG_ACK payload or a response message without a CFG_ACK + payload. There are currently no defined uses for the CFG_SET/CFG_ACK + exchange, though they may be used in connection with extensions based + on Vendor IDs. An minimal implementation of this specification MAY + ignore CFG_SET payloads. + + {{ Demoted the SHOULD }} Extensions via the CP payload should not be + used for general purpose management. Its main intent is to provide a + bootstrap mechanism to exchange information within IPsec from IRAS to + IRAC. While it MAY be useful to use such a method to exchange + information between some Security Gateways (SGW) or small networks, + existing management protocols such as DHCP [DHCP], RADIUS [RADIUS], + SNMP, or LDAP [LDAP] should be preferred for enterprise management as + well as subsequent information exchanges. + + The Configuration Payload is defined as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! CFG Type ! RESERVED ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Configuration Attributes ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 22: Configuration Payload Format + + The payload type for the Configuration Payload is forty seven (47). + + + + + +Hoffman Expires July 5, 2006 [Page 93] + +Internet-Draft IKEv2 January 2006 + + + o CFG Type (1 octet) - The type of exchange represented by the + Configuration Attributes. + + CFG Type Value + -------------------------- + RESERVED 0 + CFG_REQUEST 1 + CFG_REPLY 2 + CFG_SET 3 + CFG_ACK 4 + RESERVED TO IANA 5-127 + PRIVATE USE 128-255 + + o RESERVED (3 octets) - MUST be sent as zero; MUST be ignored on + receipt. + + o Configuration Attributes (variable length) - These are type length + values specific to the Configuration Payload and are defined + below. There may be zero or more Configuration Attributes in this + payload. + +3.15.1. Configuration Attributes + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + !R| Attribute Type ! Length | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + ~ Value ~ + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 23: Configuration Attribute Format + + o Reserved (1 bit) - This bit MUST be set to zero and MUST be + ignored on receipt. + + o Attribute Type (15 bits) - A unique identifier for each of the + Configuration Attribute Types. + + o Length (2 octets) - Length in octets of Value. + + o Value (0 or more octets) - The variable-length value of this + Configuration Attribute. The following attribute types have been + defined: + + + + + +Hoffman Expires July 5, 2006 [Page 94] + +Internet-Draft IKEv2 January 2006 + + + Multi- + Attribute Type Value Valued Length + ------------------------------------------------------- + RESERVED 0 + INTERNAL_IP4_ADDRESS 1 YES* 0 or 4 octets + INTERNAL_IP4_NETMASK 2 NO 0 or 4 octets + INTERNAL_IP4_DNS 3 YES 0 or 4 octets + INTERNAL_IP4_NBNS 4 YES 0 or 4 octets + INTERNAL_ADDRESS_EXPIRY 5 NO 0 or 4 octets + INTERNAL_IP4_DHCP 6 YES 0 or 4 octets + APPLICATION_VERSION 7 NO 0 or more + INTERNAL_IP6_ADDRESS 8 YES* 0 or 17 octets + RESERVED 9 + INTERNAL_IP6_DNS 10 YES 0 or 16 octets + INTERNAL_IP6_NBNS 11 YES 0 or 16 octets + INTERNAL_IP6_DHCP 12 YES 0 or 16 octets + INTERNAL_IP4_SUBNET 13 YES 0 or 8 octets + SUPPORTED_ATTRIBUTES 14 NO Multiple of 2 + INTERNAL_IP6_SUBNET 15 YES 17 octets + RESERVED TO IANA 16-16383 + PRIVATE USE 16384-32767 + + * These attributes may be multi-valued on return only if + multiple values were requested. + + o INTERNAL_IP4_ADDRESS, INTERNAL_IP6_ADDRESS - An address on the + internal network, sometimes called a red node address or private + address and MAY be a private address on the Internet. {{ + Clarif-6.3}} In a request message, the address specified is a + requested address (or a zero-length address if no specific address + is requested). If a specific address is requested, it likely + indicates that a previous connection existed with this address and + the requestor would like to reuse that address. With IPv6, a + requestor MAY supply the low-order address bytes it wants to use. + Multiple internal addresses MAY be requested by requesting + multiple internal address attributes. The responder MAY only send + up to the number of addresses requested. The INTERNAL_IP6_ADDRESS + is made up of two fields: the first is a 16-octet IPv6 address, + and the second is a one-octet prefix-length as defined in + [ADDRIPV6]. + + The requested address is valid until the expiry time defined with + the INTERNAL_ADDRESS_EXPIRY attribute or there are no IKE_SAs + between the peers. + + o INTERNAL_IP4_NETMASK - The internal network's netmask. Only one + netmask is allowed in the request and reply messages (e.g., + 255.255.255.0), and it MUST be used only with an + + + +Hoffman Expires July 5, 2006 [Page 95] + +Internet-Draft IKEv2 January 2006 + + + INTERNAL_IP4_ADDRESS attribute. {{ Clarif-6.5 }} + INTERNAL_IP4_NETMASK in a CFG_REPLY means roughly the same thing + as INTERNAL_IP4_SUBNET containing the same information ("send + traffic to these addresses through me"), but also implies a link + boundary. For instance, the client could use its own address and + the netmask to calculate the broadcast address of the link. An + empty INTERNAL_IP4_NETMASK attribute can be included in a + CFG_REQUEST to request this information (although the gateway can + send the information even when not requested). Non-empty values + for this attribute in a CFG_REQUEST do not make sense and thus + MUST NOT be included. + + o INTERNAL_IP4_DNS, INTERNAL_IP6_DNS - Specifies an address of a DNS + server within the network. Multiple DNS servers MAY be requested. + The responder MAY respond with zero or more DNS server attributes. + + o INTERNAL_IP4_NBNS, INTERNAL_IP6_NBNS - Specifies an address of a + NetBios Name Server (WINS) within the network. Multiple NBNS + servers MAY be requested. The responder MAY respond with zero or + more NBNS server attributes. {{ Clarif-6.7 }} NetBIOS is not + defined for IPv6; therefore, INTERNAL_IP6_NBNS SHOULD NOT be used. + + o INTERNAL_ADDRESS_EXPIRY - Specifies the number of seconds that the + host can use the internal IP address. The host MUST renew the IP + address before this expiry time. Only one of these attributes MAY + be present in the reply. {{ Clarif-6.8 }} Expiry times and + explicit renewals are primarily useful in environments like DHCP, + where the server cannot reliably know when the client has gone + away. However, in IKEv2, this is known, and the gateway can + simply free the address when the IKE_SA is deleted. Further, + supporting renewals is not mandatory. Thus + INTERNAL_ADDRESS_EXPIRY attribute MUST NOT be used. + + o INTERNAL_IP4_DHCP, INTERNAL_IP6_DHCP - Instructs the host to send + any internal DHCP requests to the address contained within the + attribute. Multiple DHCP servers MAY be requested. The responder + MAY respond with zero or more DHCP server attributes. + + o APPLICATION_VERSION - The version or application information of + the IPsec host. This is a string of printable ASCII characters + that is NOT null terminated. + + o INTERNAL_IP4_SUBNET - The protected sub-networks that this edge- + device protects. This attribute is made up of two fields: the + first being an IP address and the second being a netmask. + Multiple sub-networks MAY be requested. The responder MAY respond + with zero or more sub-network attributes. + + + + +Hoffman Expires July 5, 2006 [Page 96] + +Internet-Draft IKEv2 January 2006 + + + o SUPPORTED_ATTRIBUTES - When used within a Request, this attribute + MUST be zero-length and specifies a query to the responder to + reply back with all of the attributes that it supports. The + response contains an attribute that contains a set of attribute + identifiers each in 2 octets. The length divided by 2 (octets) + would state the number of supported attributes contained in the + response. + + o INTERNAL_IP6_SUBNET - The protected sub-networks that this edge- + device protects. This attribute is made up of two fields: the + first is a 16-octet IPv6 address, and the second is a one-octet + prefix-length as defined in [ADDRIPV6]. Multiple sub-networks MAY + be requested. The responder MAY respond with zero or more sub- + network attributes. + + Note that no recommendations are made in this document as to how an + implementation actually figures out what information to send in a + reply. That is, we do not recommend any specific method of an IRAS + determining which DNS server should be returned to a requesting IRAC. + +3.15.2. Meaning of INTERNAL_IP4_SUBNET/INTERNAL_IP6_SUBNET + + {{ Section added based on Clarif-6.4 }} + + INTERNAL_IP4/6_SUBNET attributes can indicate additional subnets, + ones that need one or more separate SAs, that can be reached through + the gateway that announces the attributes. INTERNAL_IP4/6_SUBNET + attributes may also express the gateway's policy about what traffic + should be sent through the gateway; the client can choose whether + other traffic (covered by TSr, but not in INTERNAL_IP4/6_SUBNET) is + sent through the gateway or directly to the destination. Thus, + traffic to the addresses listed in the INTERNAL_IP4/6_SUBNET + attributes should be sent through the gateway that announces the + attributes. If there are no existing IPsec SAs whose traffic + selectors cover the address in question, new SAs need to be created. + + For instance, if there are two subnets, 192.0.1.0/26 and + 192.0.2.0/24, and the client's request contains the following: + + CP(CFG_REQUEST) = + INTERNAL_IP4_ADDRESS() + TSi = (0, 0-65535, 0.0.0.0-255.255.255.255) + TSr = (0, 0-65535, 0.0.0.0-255.255.255.255) + + then a valid response could be the following (in which TSr and + INTERNAL_IP4_SUBNET contain the same information): + + + + + +Hoffman Expires July 5, 2006 [Page 97] + +Internet-Draft IKEv2 January 2006 + + + CP(CFG_REPLY) = + INTERNAL_IP4_ADDRESS(192.0.1.234) + INTERNAL_IP4_SUBNET(192.0.1.0/255.255.255.192) + INTERNAL_IP4_SUBNET(192.0.2.0/255.255.255.0) + TSi = (0, 0-65535, 192.0.1.234-192.0.1.234) + TSr = ((0, 0-65535, 192.0.1.0-192.0.1.63), + (0, 0-65535, 192.0.2.0-192.0.2.255)) + + In these cases, the INTERNAL_IP4_SUBNET does not really carry any + useful information. + + A different possible reply would have been this: + + CP(CFG_REPLY) = + INTERNAL_IP4_ADDRESS(192.0.1.234) + INTERNAL_IP4_SUBNET(192.0.1.0/255.255.255.192) + INTERNAL_IP4_SUBNET(192.0.2.0/255.255.255.0) + TSi = (0, 0-65535, 192.0.1.234-192.0.1.234) + TSr = (0, 0-65535, 0.0.0.0-255.255.255.255) + + That reply would mean that the client can send all its traffic + through the gateway, but the gateway does not mind if the client + sends traffic not included by INTERNAL_IP4_SUBNET directly to the + destination (without going through the gateway). + + A different situation arises if the gateway has a policy that + requires the traffic for the two subnets to be carried in separate + SAs. Then a response like this would indicate to the client that if + it wants access to the second subnet, it needs to create a separate + SA: + + CP(CFG_REPLY) = + INTERNAL_IP4_ADDRESS(192.0.1.234) + INTERNAL_IP4_SUBNET(192.0.1.0/255.255.255.192) + INTERNAL_IP4_SUBNET(192.0.2.0/255.255.255.0) + TSi = (0, 0-65535, 192.0.1.234-192.0.1.234) + TSr = (0, 0-65535, 192.0.1.0-192.0.1.63) + + INTERNAL_IP4_SUBNET can also be useful if the client's TSr included + only part of the address space. For instance, if the client requests + the following: + + CP(CFG_REQUEST) = + INTERNAL_IP4_ADDRESS() + TSi = (0, 0-65535, 0.0.0.0-255.255.255.255) + TSr = (0, 0-65535, 192.0.2.155-192.0.2.155) + + then the gateway's reply might be: + + + +Hoffman Expires July 5, 2006 [Page 98] + +Internet-Draft IKEv2 January 2006 + + + CP(CFG_REPLY) = + INTERNAL_IP4_ADDRESS(192.0.1.234) + INTERNAL_IP4_SUBNET(192.0.1.0/255.255.255.192) + INTERNAL_IP4_SUBNET(192.0.2.0/255.255.255.0) + TSi = (0, 0-65535, 192.0.1.234-192.0.1.234) + TSr = (0, 0-65535, 192.0.2.155-192.0.2.155) + + Because the meaning of INTERNAL_IP4_SUBNET/INTERNAL_IP6_SUBNET is in + CFG_REQUESTs is unclear, they MUST NOT be used in CFG_REQUESTs. + +3.15.3. Configuration payloads for IPv6 + + {{ Added this section from Clarif-6.6 }} + + The configuration payloads for IPv6 are based on the corresponding + IPv4 payloads, and do not fully follow the "normal IPv6 way of doing + things". In particular, IPv6 stateless autoconfiguration or router + advertisement messages are not used; neither is neighbor discovery. + + A client can be assigned an IPv6 address using the + INTERNAL_IP6_ADDRESS configuration payload. A minimal exchange might + look like this: + + CP(CFG_REQUEST) = + INTERNAL_IP6_ADDRESS() + INTERNAL_IP6_DNS() + TSi = (0, 0-65535, :: - FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF) + TSr = (0, 0-65535, :: - FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF) + + CP(CFG_REPLY) = + INTERNAL_IP6_ADDRESS(2001:DB8:0:1:2:3:4:5/64) + INTERNAL_IP6_DNS(2001:DB8:99:88:77:66:55:44) + TSi = (0, 0-65535, 2001:DB8:0:1:2:3:4:5 - 2001:DB8:0:1:2:3:4:5) + TSr = (0, 0-65535, :: - FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF) + + The client MAY send a non-empty INTERNAL_IP6_ADDRESS attribute in the + CFG_REQUEST to request a specific address or interface identifier. + The gateway first checks if the specified address is acceptable, and + if it is, returns that one. If the address was not acceptable, the + gateway attempts to use the interface identifier with some other + prefix; if even that fails, the gateway selects another interface + identifier. + + The INTERNAL_IP6_ADDRESS attribute also contains a prefix length + field. When used in a CFG_REPLY, this corresponds to the + INTERNAL_IP4_NETMASK attribute in the IPv4 case. + + Although this approach to configuring IPv6 addresses is reasonably + + + +Hoffman Expires July 5, 2006 [Page 99] + +Internet-Draft IKEv2 January 2006 + + + simple, it has some limitations. IPsec tunnels configured using + IKEv2 are not fully-featured "interfaces" in the IPv6 addressing + architecture sense [IPV6ADDR]. In particular, they do not + necessarily have link-local addresses, and this may complicate the + use of protocols that assume them, such as [MLDV2]. + +3.15.4. Address Assignment Failures + + {{ Added this section from Clarif-6.9 }} + + If the responder encounters an error while attempting to assign an IP + address to the initiator, it responds with an + INTERNAL_ADDRESS_FAILURE notification. However, there are some more + complex error cases. + + If the responder does not support configuration payloads at all, it + can simply ignore all configuration payloads. This type of + implementation never sends INTERNAL_ADDRESS_FAILURE notifications. + If the initiator requires the assignment of an IP address, it will + treat a response without CFG_REPLY as an error. + + The initiator may request a particular type of address (IPv4 or IPv6) + that the responder does not support, even though the responder + supports configuration payloads. In this case, the responder simply + ignores the type of address it does not support and processes the + rest of the request as usual. + + If the initiator requests multiple addresses of a type that the + responder supports, and some (but not all) of the requests fail, the + responder replies with the successful addresses only. The responder + sends INTERNAL_ADDRESS_FAILURE only if no addresses can be assigned. + +3.16. Extensible Authentication Protocol (EAP) Payload + + The Extensible Authentication Protocol Payload, denoted EAP in this + memo, allows IKE_SAs to be authenticated using the protocol defined + in RFC 3748 [EAP] and subsequent extensions to that protocol. The + full set of acceptable values for the payload is defined elsewhere, + but a short summary of RFC 3748 is included here to make this + document stand alone in the common cases. + + + + + + + + + + + +Hoffman Expires July 5, 2006 [Page 100] + +Internet-Draft IKEv2 January 2006 + + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ EAP Message ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 24: EAP Payload Format + + The payload type for an EAP Payload is forty eight (48). + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Code ! Identifier ! Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Type ! Type_Data... + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- + + Figure 25: EAP Message Format + + o Code (1 octet) indicates whether this message is a Request (1), + Response (2), Success (3), or Failure (4). + + o Identifier (1 octet) is used in PPP to distinguish replayed + messages from repeated ones. Since in IKE, EAP runs over a + reliable protocol, it serves no function here. In a response + message, this octet MUST be set to match the identifier in the + corresponding request. In other messages, this field MAY be set + to any value. + + o Length (2 octets) is the length of the EAP message and MUST be + four less than the Payload Length of the encapsulating payload. + + o Type (1 octet) is present only if the Code field is Request (1) or + Response (2). For other codes, the EAP message length MUST be + four octets and the Type and Type_Data fields MUST NOT be present. + In a Request (1) message, Type indicates the data being requested. + In a Response (2) message, Type MUST either be Nak or match the + type of the data requested. The following types are defined in + RFC 3748: + + + + + + + +Hoffman Expires July 5, 2006 [Page 101] + +Internet-Draft IKEv2 January 2006 + + + 1 Identity + 2 Notification + 3 Nak (Response Only) + 4 MD5-Challenge + 5 One-Time Password (OTP) + 6 Generic Token Card + + o Type_Data (Variable Length) varies with the Type of Request and + the associated Response. For the documentation of the EAP + methods, see [EAP]. + + {{ Demoted the SHOULD NOT and SHOULD }} Note that since IKE passes an + indication of initiator identity in message 3 of the protocol, the + responder should not send EAP Identity requests. The initiator may, + however, respond to such requests if it receives them. + + +4. Conformance Requirements + + In order to assure that all implementations of IKEv2 can + interoperate, there are "MUST support" requirements in addition to + those listed elsewhere. Of course, IKEv2 is a security protocol, and + one of its major functions is to allow only authorized parties to + successfully complete establishment of SAs. So a particular + implementation may be configured with any of a number of restrictions + concerning algorithms and trusted authorities that will prevent + universal interoperability. + + IKEv2 is designed to permit minimal implementations that can + interoperate with all compliant implementations. There are a series + of optional features that can easily be ignored by a particular + implementation if it does not support that feature. Those features + include: + + o Ability to negotiate SAs through a NAT and tunnel the resulting + ESP SA over UDP. + + o Ability to request (and respond to a request for) a temporary IP + address on the remote end of a tunnel. + + o Ability to support various types of legacy authentication. + + o Ability to support window sizes greater than one. + + o Ability to establish multiple ESP and/or AH SAs within a single + IKE_SA. + + + + + +Hoffman Expires July 5, 2006 [Page 102] + +Internet-Draft IKEv2 January 2006 + + + o Ability to rekey SAs. + + To assure interoperability, all implementations MUST be capable of + parsing all payload types (if only to skip over them) and to ignore + payload types that it does not support unless the critical bit is set + in the payload header. If the critical bit is set in an unsupported + payload header, all implementations MUST reject the messages + containing those payloads. + + Every implementation MUST be capable of doing four-message + IKE_SA_INIT and IKE_AUTH exchanges establishing two SAs (one for IKE, + one for ESP and/or AH). Implementations MAY be initiate-only or + respond-only if appropriate for their platform. Every implementation + MUST be capable of responding to an INFORMATIONAL exchange, but a + minimal implementation MAY respond to any INFORMATIONAL message with + an empty INFORMATIONAL reply (note that within the context of an + IKE_SA, an "empty" message consists of an IKE header followed by an + Encrypted payload with no payloads contained in it). A minimal + implementation MAY support the CREATE_CHILD_SA exchange only in so + far as to recognize requests and reject them with a Notify payload of + type NO_ADDITIONAL_SAS. A minimal implementation need not be able to + initiate CREATE_CHILD_SA or INFORMATIONAL exchanges. When an SA + expires (based on locally configured values of either lifetime or + octets passed), and implementation MAY either try to renew it with a + CREATE_CHILD_SA exchange or it MAY delete (close) the old SA and + create a new one. If the responder rejects the CREATE_CHILD_SA + request with a NO_ADDITIONAL_SAS notification, the implementation + MUST be capable of instead deleting the old SA and creating a new + one. + + Implementations are not required to support requesting temporary IP + addresses or responding to such requests. If an implementation does + support issuing such requests, it MUST include a CP payload in + message 3 containing at least a field of type INTERNAL_IP4_ADDRESS or + INTERNAL_IP6_ADDRESS. All other fields are optional. If an + implementation supports responding to such requests, it MUST parse + the CP payload of type CFG_REQUEST in message 3 and recognize a field + of type INTERNAL_IP4_ADDRESS or INTERNAL_IP6_ADDRESS. If it supports + leasing an address of the appropriate type, it MUST return a CP + payload of type CFG_REPLY containing an address of the requested + type. {{ Demoted the SHOULD }} The responder may include any other + related attributes. + + A minimal IPv4 responder implementation will ignore the contents of + the CP payload except to determine that it includes an + INTERNAL_IP4_ADDRESS attribute and will respond with the address and + other related attributes regardless of whether the initiator + requested them. + + + +Hoffman Expires July 5, 2006 [Page 103] + +Internet-Draft IKEv2 January 2006 + + + A minimal IPv4 initiator will generate a CP payload containing only + an INTERNAL_IP4_ADDRESS attribute and will parse the response + ignoring attributes it does not know how to use. {{ Clarif-6.8 + removes the sentence about processing INTERNAL_ADDRESS_EXPIRY. }} + Minimal initiators need not be able to request lease renewals and + minimal responders need not respond to them. + + For an implementation to be called conforming to this specification, + it MUST be possible to configure it to accept the following: + + o PKIX Certificates containing and signed by RSA keys of size 1024 + or 2048 bits, where the ID passed is any of ID_KEY_ID, ID_FQDN, + ID_RFC822_ADDR, or ID_DER_ASN1_DN. + + o Shared key authentication where the ID passes is any of ID_KEY_ID, + ID_FQDN, or ID_RFC822_ADDR. + + o Authentication where the responder is authenticated using PKIX + Certificates and the initiator is authenticated using shared key + authentication. + + +5. Security Considerations + + While this protocol is designed to minimize disclosure of + configuration information to unauthenticated peers, some such + disclosure is unavoidable. One peer or the other must identify + itself first and prove its identity first. To avoid probing, the + initiator of an exchange is required to identify itself first, and + usually is required to authenticate itself first. The initiator can, + however, learn that the responder supports IKE and what cryptographic + protocols it supports. The responder (or someone impersonating the + responder) can probe the initiator not only for its identity, but + using CERTREQ payloads may be able to determine what certificates the + initiator is willing to use. + + Use of EAP authentication changes the probing possibilities somewhat. + When EAP authentication is used, the responder proves its identity + before the initiator does, so an initiator that knew the name of a + valid initiator could probe the responder for both its name and + certificates. + + Repeated rekeying using CREATE_CHILD_SA without additional Diffie- + Hellman exchanges leaves all SAs vulnerable to cryptanalysis of a + single key or overrun of either endpoint. Implementers should take + note of this fact and set a limit on CREATE_CHILD_SA exchanges + between exponentiations. This memo does not prescribe such a limit. + + + + +Hoffman Expires July 5, 2006 [Page 104] + +Internet-Draft IKEv2 January 2006 + + + The strength of a key derived from a Diffie-Hellman exchange using + any of the groups defined here depends on the inherent strength of + the group, the size of the exponent used, and the entropy provided by + the random number generator used. Due to these inputs, it is + difficult to determine the strength of a key for any of the defined + groups. Diffie-Hellman group number two, when used with a strong + random number generator and an exponent no less than 200 bits, is + common for use with 3DES. Group five provides greater security than + group two. Group one is for historic purposes only and does not + provide sufficient strength except for use with DES, which is also + for historic use only. Implementations should make note of these + estimates when establishing policy and negotiating security + parameters. + + Note that these limitations are on the Diffie-Hellman groups + themselves. There is nothing in IKE that prohibits using stronger + groups nor is there anything that will dilute the strength obtained + from stronger groups (limited by the strength of the other algorithms + negotiated including the prf function). In fact, the extensible + framework of IKE encourages the definition of more groups; use of + elliptical curve groups may greatly increase strength using much + smaller numbers. + + It is assumed that all Diffie-Hellman exponents are erased from + memory after use. In particular, these exponents MUST NOT be derived + from long-lived secrets like the seed to a pseudo-random generator + that is not erased after use. + + The strength of all keys is limited by the size of the output of the + negotiated prf function. For this reason, a prf function whose + output is less than 128 bits (e.g., 3DES-CBC) MUST NOT be used with + this protocol. + + The security of this protocol is critically dependent on the + randomness of the randomly chosen parameters. These should be + generated by a strong random or properly seeded pseudo-random source + (see [RANDOMNESS]). Implementers should take care to ensure that use + of random numbers for both keys and nonces is engineered in a fashion + that does not undermine the security of the keys. + + For information on the rationale of many of the cryptographic design + choices in this protocol, see [SIGMA] and [SKEME]. Though the + security of negotiated CHILD_SAs does not depend on the strength of + the encryption and integrity protection negotiated in the IKE_SA, + implementations MUST NOT negotiate NONE as the IKE integrity + protection algorithm or ENCR_NULL as the IKE encryption algorithm. + + When using pre-shared keys, a critical consideration is how to assure + + + +Hoffman Expires July 5, 2006 [Page 105] + +Internet-Draft IKEv2 January 2006 + + + the randomness of these secrets. The strongest practice is to ensure + that any pre-shared key contain as much randomness as the strongest + key being negotiated. Deriving a shared secret from a password, + name, or other low-entropy source is not secure. These sources are + subject to dictionary and social engineering attacks, among others. + + The NAT_DETECTION_*_IP notifications contain a hash of the addresses + and ports in an attempt to hide internal IP addresses behind a NAT. + Since the IPv4 address space is only 32 bits, and it is usually very + sparse, it would be possible for an attacker to find out the internal + address used behind the NAT box by trying all possible IP addresses + and trying to find the matching hash. The port numbers are normally + fixed to 500, and the SPIs can be extracted from the packet. This + reduces the number of hash calculations to 2^32. With an educated + guess of the use of private address space, the number of hash + calculations is much smaller. Designers should therefore not assume + that use of IKE will not leak internal address information. + + When using an EAP authentication method that does not generate a + shared key for protecting a subsequent AUTH payload, certain man-in- + the-middle and server impersonation attacks are possible [EAPMITM]. + These vulnerabilities occur when EAP is also used in protocols that + are not protected with a secure tunnel. Since EAP is a general- + purpose authentication protocol, which is often used to provide + single-signon facilities, a deployed IPsec solution that relies on an + EAP authentication method that does not generate a shared key (also + known as a non-key-generating EAP method) can become compromised due + to the deployment of an entirely unrelated application that also + happens to use the same non-key-generating EAP method, but in an + unprotected fashion. Note that this vulnerability is not limited to + just EAP, but can occur in other scenarios where an authentication + infrastructure is reused. For example, if the EAP mechanism used by + IKEv2 utilizes a token authenticator, a man-in-the-middle attacker + could impersonate the web server, intercept the token authentication + exchange, and use it to initiate an IKEv2 connection. For this + reason, use of non-key-generating EAP methods SHOULD be avoided where + possible. Where they are used, it is extremely important that all + usages of these EAP methods SHOULD utilize a protected tunnel, where + the initiator validates the responder's certificate before initiating + the EAP exchange. {{ Demoted the SHOULD }} Implementers should + describe the vulnerabilities of using non-key-generating EAP methods + in the documentation of their implementations so that the + administrators deploying IPsec solutions are aware of these dangers. + + An implementation using EAP MUST also use a public-key-based + authentication of the server to the client before the EAP exchange + begins, even if the EAP method offers mutual authentication. This + avoids having additional IKEv2 protocol variations and protects the + + + +Hoffman Expires July 5, 2006 [Page 106] + +Internet-Draft IKEv2 January 2006 + + + EAP data from active attackers. + + If the messages of IKEv2 are long enough that IP-level fragmentation + is necessary, it is possible that attackers could prevent the + exchange from completing by exhausting the reassembly buffers. The + chances of this can be minimized by using the Hash and URL encodings + instead of sending certificates (see Section 3.6). Additional + mitigations are discussed in [DOSUDPPROT]. + + +6. IANA Considerations + + {{ This section was changed to not re-define any new IANA registries. + }} + + [IKEV2] defined many field types and values. IANA has already + registered those types and values, so the are not listed here again. + No new types or values are registered in IKEv2.1. + + +7. Acknowledgements + + {{ Added new acknowledgements. }} + + Charlie Kaufman did a huge amount of work on the original IKEv2 + document, on which this document is primarily based. Pasi Eronen + worked hard on the clarifications document, which is the basis for + the differences between IKEv2 and IKEv2.1. The individuals on the + IPsec mailing list was very helpful in both pointing out where + clarifications and changes were needed, as well as in reviewing the + clarifications suggested by others. + + The acknowledgements from the IKEv2 document were: + + This document is a collaborative effort of the entire IPsec WG. If + there were no limit to the number of authors that could appear on an + RFC, the following, in alphabetical order, would have been listed: + Bill Aiello, Stephane Beaulieu, Steve Bellovin, Sara Bitan, Matt + Blaze, Ran Canetti, Darren Dukes, Dan Harkins, Paul Hoffman, John + Ioannidis, Charlie Kaufman, Steve Kent, Angelos Keromytis, Tero + Kivinen, Hugo Krawczyk, Andrew Krywaniuk, Radia Perlman, Omer + Reingold, and Michael Richardson. Many other people contributed to + the design. It is an evolution of IKEv1, ISAKMP, and the IPsec DOI, + each of which has its own list of authors. Hugh Daniel suggested the + feature of having the initiator, in message 3, specify a name for the + responder, and gave the feature the cute name "You Tarzan, Me Jane". + David Faucher and Valery Smyzlov helped refine the design of the + traffic selector negotiation. + + + +Hoffman Expires July 5, 2006 [Page 107] + +Internet-Draft IKEv2 January 2006 + + + This paragraph lists references that appear only in figures. The + section is only here to keep the 'xml2rfc' program happy, and will be + removed when the document is published. Feel free to ignore it. + [DES] [IDEA] [MD5] [X.501] [X.509] + + +8. References + +8.1. Normative References + + [ADDGROUP] + Kivinen, T. and M. Kojo, "More Modular Exponential (MODP) + Diffie-Hellman groups for Internet Key Exchange (IKE)", + RFC 3526, May 2003. + + [ADDRIPV6] + Hinden, R. and S. Deering, "Internet Protocol Version 6 + (IPv6) Addressing Architecture", RFC 3513, April 2003. + + [Clarif] "IKEv2 Clarifications and Implementation Guidelines", + draft-eronen-ipsec-ikev2-clarifications (work in + progress). + + [EAP] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H. + Levkowetz, "Extensible Authentication Protocol (EAP)", + RFC 3748, June 2004. + + [ECN] Ramakrishnan, K., Floyd, S., and D. Black, "The Addition + of Explicit Congestion Notification (ECN) to IP", + RFC 3168, September 2001. + + [ESPCBC] Pereira, R. and R. Adams, "The ESP CBC-Mode Cipher + Algorithms", RFC 2451, November 1998. + + [IANACONS] + Narten, T. and H. Alvestrand, "Guidelines for Writing an + IANA Considerations Section in RFCs", BCP 26, RFC 2434. + + [IKEV2] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol", + RFC 4306, December 2005. + + [IPSECARCH] + Kent, S. and K. Seo, "Security Architecture for the + Internet Protocol", RFC 4301, December 2005. + + [MUSTSHOULD] + Bradner, S., "Key Words for use in RFCs to indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + + +Hoffman Expires July 5, 2006 [Page 108] + +Internet-Draft IKEv2 January 2006 + + + [PKIX] Housley, R., Polk, W., Ford, W., and D. Solo, "Internet + X.509 Public Key Infrastructure Certificate and + Certificate Revocation List (CRL) Profile", RFC 3280, + April 2002. + + [UDPENCAPS] + Huttunen, A., Swander, B., Volpe, V., DiBurro, L., and M. + Stenberg, "UDP Encapsulation of IPsec ESP Packets", + RFC 3948, January 2005. + +8.2. Informative References + + [AH] Kent, S., "IP Authentication Header", RFC 4302, + December 2005. + + [ARCHGUIDEPHIL] + Bush, R. and D. Meyer, "Some Internet Architectural + Guidelines and Philosophy", RFC 3439, December 2002. + + [ARCHPRINC] + Carpenter, B., "Architectural Principles of the Internet", + RFC 1958, June 1996. + + [DES] American National Standards Institute, "American National + Standard for Information Systems-Data Link Encryption", + ANSI X3.106, 1983. + + [DH] Diffie, W. and M. Hellman, "New Directions in + Cryptography", IEEE Transactions on Information Theory, + V.IT-22 n. 6, June 1977. + + [DHCP] Droms, R., "Dynamic Host Configuration Protocol", + RFC 2131, March 1997. + + [DIFFSERVARCH] + Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z., + and W. Weiss, "An Architecture for Differentiated + Services", RFC 2475. + + [DIFFSERVFIELD] + Nichols, K., Blake, S., Baker, F., and D. Black, + "Definition of the Differentiated Services Field (DS + Field) in the IPv4 and IPv6 Headers", RFC 2474, + December 1998. + + [DIFFTUNNEL] + Black, D., "Differentiated Services and Tunnels", + RFC 2983, October 2000. + + + +Hoffman Expires July 5, 2006 [Page 109] + +Internet-Draft IKEv2 January 2006 + + + [DOI] Piper, D., "The Internet IP Security Domain of + Interpretation for ISAKMP", RFC 2407, November 1998. + + [DOSUDPPROT] + C. Kaufman, R. Perlman, and B. Sommerfeld, "DoS protection + for UDP-based protocols", ACM Conference on Computer and + Communications Security , October 2003. + + [DSS] National Institute of Standards and Technology, U.S. + Department of Commerce, "Digital Signature Standard", + FIPS 186, May 1994. + + [EAPMITM] N. Asokan, V. Nierni, and K. Nyberg, "Man-in-the-Middle in + Tunneled Authentication Protocols", November 2002, + <http://eprint.iacr.org/2002/163>. + + [ESP] Kent, S., "IP Encapsulating Security Payload (ESP)", + RFC 4303, December 2005. + + [EXCHANGEANALYSIS] + R. Perlman and C. Kaufman, "Analysis of the IPsec key + exchange Standard", WET-ICE Security Conference, MIT , + 2001, + <http://sec.femto.org/wetice-2001/papers/radia-paper.pdf>. + + [HMAC] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed- + Hashing for Message Authentication", RFC 2104, + February 1997. + + [IDEA] X. Lai, "On the Design and Security of Block Ciphers", ETH + Series in Information Processing, v. 1, Konstanz: Hartung- + Gorre Verlag, 1992. + + [IKEV1] Harkins, D. and D. Carrel, "The Internet Key Exchange + (IKE)", RFC 2409, November 1998. + + [IPCOMP] Shacham, A., Monsour, B., Pereira, R., and M. Thomas, "IP + Payload Compression Protocol (IPComp)", RFC 3173, + September 2001. + + [IPSECARCH-OLD] + Kent, S. and R. Atkinson, "Security Architecture for the + Internet Protocol", RFC 2401, November 1998. + + [IPV6ADDR] + Hinden, R. and S. Deering, "Internet Protocol Version 6 + (IPv6) Addressing Architecture", RFC 3513, April 2003. + + + + +Hoffman Expires July 5, 2006 [Page 110] + +Internet-Draft IKEv2 January 2006 + + + [ISAKMP] Maughan, D., Schneider, M., and M. Schertler, "Internet + Security Association and Key Management Protocol + (ISAKMP)", RFC 2408, November 1998. + + [LDAP] Wahl, M., Howes, T., and S. Kille, "Lightweight Directory + Access Protocol (v3)", RFC 2251, December 1997. + + [MAILFORMAT] + Resnick, P., "Internet Message Format", RFC 2822, + April 2001. + + [MD5] Rivest, R., "The MD5 Message-Digest Algorithm", RFC 1321, + April 1992. + + [MIPV6] Johnson, D., Perkins, C., and J. Arkko, "Mobility Support + in IPv6", RFC 3775, June 2004. + + [MLDV2] Vida, R. and L. Costa, "Multicast Listener Discovery + Version 2 (MLDv2) for IPv6", RFC 3810, June 2004. + + [NAI] Aboba, B. and M. Beadles, "The Network Access Identifier", + RFC 2486, January 1999. + + [NATREQ] Aboba, B. and W. Dixon, "IPsec-Network Address Translation + (NAT) Compatibility Requirements", RFC 3715, March 2004. + + [OAKLEY] Orman, H., "The OAKLEY Key Determination Protocol", + RFC 2412, November 1998. + + [PFKEY] McDonald, D., Metz, C., and B. Phan, "PF_KEY Key + Management API, Version 2", RFC 2367, July 1998. + + [PHOTURIS] + Karn, P. and W. Simpson, "Photuris: Session-Key Management + Protocol", RFC 2522, March 1999. + + [PKCS1] B. Kaliski and J. Staddon, "PKCS #1: RSA Cryptography + Specifications Version 2", September 1998. + + [PRFAES128CBC] + Hoffman, P., "The AES-XCBC-PRF-128 Algorithm for the + Internet Key Exchange Protocol (IKE)", RFC 3664, + January 2004. + + [PRFAES128CBC-bis] + Hoffman, P., "The AES-XCBC-PRF-128 Algorithm for the + Internet Key Exchange Protocol (IKE)", + draft-hoffman-rfc3664bis (work in progress), October 2005. + + + +Hoffman Expires July 5, 2006 [Page 111] + +Internet-Draft IKEv2 January 2006 + + + [RADIUS] Rigney, C., Rubens, A., Simpson, W., and S. Willens, + "Remote Authentication Dial In User Service (RADIUS)", + RFC 2138, April 1997. + + [RANDOMNESS] + Eastlake, D., Schiller, J., and S. Crocker, "Randomness + Requirements for Security", BCP 106, RFC 4086, June 2005. + + [REAUTH] Nir, Y., ""Repeated Authentication in IKEv2", + draft-nir-ikev2-auth-lt (work in progress), May 2005. + + [RSA] R. Rivest, A. Shamir, and L. Adleman, "A Method for + Obtaining Digital Signatures and Public-Key + Cryptosystems", February 1978. + + [SHA] National Institute of Standards and Technology, U.S. + Department of Commerce, "Secure Hash Standard", + FIPS 180-1, May 1994. + + [SIGMA] H. Krawczyk, "SIGMA: the `SIGn-and-MAc' Approach to + Authenticated Diffie-Hellman and its Use in the IKE + Protocols", Advances in Cryptography - CRYPTO 2003 + Proceedings LNCS 2729, 2003, <http:// + www.informatik.uni-trier.de/~ley/db/conf/crypto/ + crypto2003.html>. + + [SKEME] H. Krawczyk, "SKEME: A Versatile Secure Key Exchange + Mechanism for Internet", IEEE Proceedings of the 1996 + Symposium on Network and Distributed Systems Security , + 1996. + + [TRANSPARENCY] + Carpenter, B., "Internet Transparency", RFC 2775, + February 2000. + + [X.501] ITU-T, "Recommendation X.501: Information Technology - + Open Systems Interconnection - The Directory: Models", + 1993. + + [X.509] ITU-T, "Recommendation X.509 (1997 E): Information + Technology - Open Systems Interconnection - The Directory: + Authentication Framework", 1997. + + +Appendix A. Summary of changes from IKEv1 + + The goals of this revision to IKE are: + + + + +Hoffman Expires July 5, 2006 [Page 112] + +Internet-Draft IKEv2 January 2006 + + + 1. To define the entire IKE protocol in a single document, + replacing RFCs 2407, 2408, and 2409 and incorporating subsequent + changes to support NAT Traversal, Extensible Authentication, and + Remote Address acquisition; + + 2. To simplify IKE by replacing the eight different initial + exchanges with a single four-message exchange (with changes in + authentication mechanisms affecting only a single AUTH payload + rather than restructuring the entire exchange) see + [EXCHANGEANALYSIS]; + + 3. To remove the Domain of Interpretation (DOI), Situation (SIT), + and Labeled Domain Identifier fields, and the Commit and + Authentication only bits; + + 4. To decrease IKE's latency in the common case by making the + initial exchange be 2 round trips (4 messages), and allowing the + ability to piggyback setup of a CHILD_SA on that exchange; + + 5. To replace the cryptographic syntax for protecting the IKE + messages themselves with one based closely on ESP to simplify + implementation and security analysis; + + 6. To reduce the number of possible error states by making the + protocol reliable (all messages are acknowledged) and sequenced. + This allows shortening CREATE_CHILD_SA exchanges from 3 messages + to 2; + + 7. To increase robustness by allowing the responder to not do + significant processing until it receives a message proving that + the initiator can receive messages at its claimed IP address, + and not commit any state to an exchange until the initiator can + be cryptographically authenticated; + + 8. To fix cryptographic weaknesses such as the problem with + symmetries in hashes used for authentication documented by Tero + Kivinen; + + 9. To specify Traffic Selectors in their own payloads type rather + than overloading ID payloads, and making more flexible the + Traffic Selectors that may be specified; + + 10. To specify required behavior under certain error conditions or + when data that is not understood is received in order to make it + easier to make future revisions in a way that does not break + backwards compatibility; + + + + + +Hoffman Expires July 5, 2006 [Page 113] + +Internet-Draft IKEv2 January 2006 + + + 11. To simplify and clarify how shared state is maintained in the + presence of network failures and Denial of Service attacks; and + + 12. To maintain existing syntax and magic numbers to the extent + possible to make it likely that implementations of IKEv1 can be + enhanced to support IKEv2 with minimum effort. + + +Appendix B. Diffie-Hellman Groups + + There are two Diffie-Hellman groups defined here for use in IKE. + These groups were generated by Richard Schroeppel at the University + of Arizona. Properties of these primes are described in [OAKLEY]. + + The strength supplied by group one may not be sufficient for the + mandatory-to-implement encryption algorithm and is here for historic + reasons. + + Additional Diffie-Hellman groups have been defined in [ADDGROUP]. + +B.1. Group 1 - 768 Bit MODP + + This group is assigned id 1 (one). + + The prime is: 2^768 - 2 ^704 - 1 + 2^64 * { [2^638 pi] + 149686 } + Its hexadecimal value is: + + FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1 + 29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD + EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245 + E485B576 625E7EC6 F44C42E9 A63A3620 FFFFFFFF FFFFFFFF + + The generator is 2. + +B.2. Group 2 - 1024 Bit MODP + + This group is assigned id 2 (two). + + The prime is 2^1024 - 2^960 - 1 + 2^64 * { [2^894 pi] + 129093 }. + Its hexadecimal value is: + + FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1 + 29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD + EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245 + E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED + EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE65381 + FFFFFFFF FFFFFFFF + + + + +Hoffman Expires July 5, 2006 [Page 114] + +Internet-Draft IKEv2 January 2006 + + + The generator is 2. + + +Appendix C. Exchanges and Payloads + + {{ Clarif-AppA }} + + This appendix contains a short summary of the IKEv2 exchanges, and + what payloads can appear in which message. This appendix is purely + informative; if it disagrees with the body of this document, the + other text is considered correct. + + Vendor-ID (V) payloads may be included in any place in any message. + This sequence here shows what are the most logical places for them. + +C.1. IKE_SA_INIT Exchange + + request --> [N(COOKIE)], + SA, KE, Ni, + [N(NAT_DETECTION_SOURCE_IP)+, + N(NAT_DETECTION_DESTINATION_IP)], + [V+] + + normal response <-- SA, KE, Nr, + (no cookie) [N(NAT_DETECTION_SOURCE_IP), + N(NAT_DETECTION_DESTINATION_IP)], + [[N(HTTP_CERT_LOOKUP_SUPPORTED)], CERTREQ+], + [V+] + + + + + + + + + + + + + + + + + + + + + + + +Hoffman Expires July 5, 2006 [Page 115] + +Internet-Draft IKEv2 January 2006 + + +C.2. IKE_AUTH Exchange without EAP + + request --> IDi, [CERT+], + [N(INITIAL_CONTACT)], + [[N(HTTP_CERT_LOOKUP_SUPPORTED)], CERTREQ+], + [IDr], + AUTH, + [CP(CFG_REQUEST)], + [N(IPCOMP_SUPPORTED)+], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, TSi, TSr, + [V+] + + response <-- IDr, [CERT+], + AUTH, + [CP(CFG_REPLY)], + [N(IPCOMP_SUPPORTED)], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, TSi, TSr, + [N(ADDITIONAL_TS_POSSIBLE)], + [V+] + + + + + + + + + + + + + + + + + + + + + + + + + + +Hoffman Expires July 5, 2006 [Page 116] + +Internet-Draft IKEv2 January 2006 + + +C.3. IKE_AUTH Exchange with EAP + + first request --> IDi, + [N(INITIAL_CONTACT)], + [[N(HTTP_CERT_LOOKUP_SUPPORTED)], CERTREQ+], + [IDr], + [CP(CFG_REQUEST)], + [N(IPCOMP_SUPPORTED)+], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, TSi, TSr, + [V+] + + first response <-- IDr, [CERT+], AUTH, + EAP, + [V+] + + / --> EAP + repeat 1..N times | + \ <-- EAP + + last request --> AUTH + + last response <-- AUTH, + [CP(CFG_REPLY)], + [N(IPCOMP_SUPPORTED)], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, TSi, TSr, + [N(ADDITIONAL_TS_POSSIBLE)], + [V+] + + + + + + + + + + + + + + + + + + +Hoffman Expires July 5, 2006 [Page 117] + +Internet-Draft IKEv2 January 2006 + + +C.4. CREATE_CHILD_SA Exchange for Creating or Rekeying CHILD_SAs + + request --> [N(REKEY_SA)], + [N(IPCOMP_SUPPORTED)+], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, Ni, [KEi], TSi, TSr + + response <-- [N(IPCOMP_SUPPORTED)], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, Nr, [KEr], TSi, TSr, + [N(ADDITIONAL_TS_POSSIBLE)] + +C.5. CREATE_CHILD_SA Exchange for Rekeying the IKE_SA + + request --> SA, Ni, [KEi] + + response <-- SA, Nr, [KEr] + +C.6. INFORMATIONAL Exchange + + request --> [N+], + [D+], + [CP(CFG_REQUEST)] + + response <-- [N+], + [D+], + [CP(CFG_REPLY)] + + +Appendix D. Changes Between Internet Draft Versions + + This section will be removed before publication as an RFC. + +D.1. Changes from IKEv2 to draft -00 + + There were a zillion additions from the Clarifications document. + These are noted with "{{ Clarif-nn }}". + + Cleaned up many of the figures. Made the table headings consistent. + Made some tables easier to read by removing blank spaces. Removed + the "reserved to IANA" and "private use" text wording and moved it + into the tables. + + Changed many SHOULD and MUST requirements to better match RFC 2119. + + + +Hoffman Expires July 5, 2006 [Page 118] + +Internet-Draft IKEv2 January 2006 + + +Author's Address + + Paul Hoffman + VPN Consortium + 127 Segre Place + Santa Cruz, CA 95060 + US + + Phone: 1-831-426-9827 + Email: paul.hoffman@vpnc.org + + +Full Copyright Statement + + Copyright (C) The Internet Society (2006). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + + + +Hoffman Expires July 5, 2006 [Page 119] + +Internet-Draft IKEv2 January 2006 + + + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at + ietf-ipr@ietf.org. + + +Acknowledgment + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Hoffman Expires July 5, 2006 [Page 120] + diff --git a/doc/standards/draft-hoffman-ikev2bis-00.txt b/doc/standards/draft-hoffman-ikev2bis-00.txt new file mode 100644 index 000000000..9d1b9d74d --- /dev/null +++ b/doc/standards/draft-hoffman-ikev2bis-00.txt @@ -0,0 +1,6776 @@ + + + +Network Working Group C. Kaufman +Internet-Draft Microsoft +Expires: August 27, 2006 P. Hoffman + VPN Consortium + P. Eronen + Nokia + February 23, 2006 + + + Internet Key Exchange Protocol: IKEv2 + draft-hoffman-ikev2bis-00.txt + +Status of this Memo + + By submitting this Internet-Draft, each author represents that any + applicable patent or other IPR claims of which he or she is aware + have been or will be disclosed, and any of which he or she becomes + aware will be disclosed, in accordance with Section 6 of BCP 79. + + Internet-Drafts are working documents of the Internet Engineering + Task Force (IETF), its areas, and its working groups. Note that + other groups may also distribute working documents as Internet- + Drafts. + + Internet-Drafts are draft documents valid for a maximum of six months + and may be updated, replaced, or obsoleted by other documents at any + time. It is inappropriate to use Internet-Drafts as reference + material or to cite them other than as "work in progress." + + The list of current Internet-Drafts can be accessed at + http://www.ietf.org/ietf/1id-abstracts.txt. + + The list of Internet-Draft Shadow Directories can be accessed at + http://www.ietf.org/shadow.html. + + This Internet-Draft will expire on August 27, 2006. + +Copyright Notice + + Copyright (C) The Internet Society (2006). + +Abstract + + This document describes version 2 of the Internet Key Exchange (IKE) + protocol. It is a restatement of RFC 4306, and includes all of the + clarifications from the "IKEv2 Clarifications" document. + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 1] + +Internet-Draft IKEv2bis February 2006 + + +Table of Contents + + 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 5 + 1.1. Usage Scenarios . . . . . . . . . . . . . . . . . . . . . 6 + 1.1.1. Security Gateway to Security Gateway Tunnel . . . . . 7 + 1.1.2. Endpoint-to-Endpoint Transport . . . . . . . . . . . 7 + 1.1.3. Endpoint to Security Gateway Tunnel . . . . . . . . . 8 + 1.1.4. Other Scenarios . . . . . . . . . . . . . . . . . . . 9 + 1.2. The Initial Exchanges . . . . . . . . . . . . . . . . . . 9 + 1.3. The CREATE_CHILD_SA Exchange . . . . . . . . . . . . . . 12 + 1.3.1. Creating New CHILD_SAs with the CREATE_CHILD_SA + Exchange . . . . . . . . . . . . . . . . . . . . . . 13 + 1.3.2. Rekeying IKE_SAs with the CREATE_CHILD_SA Exchange . 14 + 1.3.3. Rekeying CHILD_SAs with the CREATE_CHILD_SA + Exchange . . . . . . . . . . . . . . . . . . . . . . 14 + 1.4. The INFORMATIONAL Exchange . . . . . . . . . . . . . . . 15 + 1.5. Informational Messages outside of an IKE_SA . . . . . . . 16 + 1.6. Requirements Terminology . . . . . . . . . . . . . . . . 17 + 1.7. Differences Between RFC 4306 and This Document . . . . . 17 + 2. IKE Protocol Details and Variations . . . . . . . . . . . . . 18 + 2.1. Use of Retransmission Timers . . . . . . . . . . . . . . 19 + 2.2. Use of Sequence Numbers for Message ID . . . . . . . . . 19 + 2.3. Window Size for Overlapping Requests . . . . . . . . . . 20 + 2.4. State Synchronization and Connection Timeouts . . . . . . 21 + 2.5. Version Numbers and Forward Compatibility . . . . . . . . 23 + 2.6. Cookies . . . . . . . . . . . . . . . . . . . . . . . . . 25 + 2.6.1. Interaction of COOKIE and INVALID_KE_PAYLOAD . . . . 27 + 2.7. Cryptographic Algorithm Negotiation . . . . . . . . . . . 28 + 2.8. Rekeying . . . . . . . . . . . . . . . . . . . . . . . . 29 + 2.8.1. Simultaneous CHILD_SA rekeying . . . . . . . . . . . 31 + 2.8.2. Rekeying the IKE_SA Versus Reauthentication . . . . . 33 + 2.9. Traffic Selector Negotiation . . . . . . . . . . . . . . 34 + 2.9.1. Traffic Selectors Violating Own Policy . . . . . . . 37 + 2.10. Nonces . . . . . . . . . . . . . . . . . . . . . . . . . 38 + 2.11. Address and Port Agility . . . . . . . . . . . . . . . . 38 + 2.12. Reuse of Diffie-Hellman Exponentials . . . . . . . . . . 38 + 2.13. Generating Keying Material . . . . . . . . . . . . . . . 39 + 2.14. Generating Keying Material for the IKE_SA . . . . . . . . 40 + 2.15. Authentication of the IKE_SA . . . . . . . . . . . . . . 41 + 2.16. Extensible Authentication Protocol Methods . . . . . . . 43 + 2.17. Generating Keying Material for CHILD_SAs . . . . . . . . 45 + 2.18. Rekeying IKE_SAs Using a CREATE_CHILD_SA Exchange . . . . 46 + 2.19. Requesting an Internal Address on a Remote Network . . . 47 + 2.20. Requesting the Peer's Version . . . . . . . . . . . . . . 48 + 2.21. Error Handling . . . . . . . . . . . . . . . . . . . . . 49 + 2.22. IPComp . . . . . . . . . . . . . . . . . . . . . . . . . 50 + 2.23. NAT Traversal . . . . . . . . . . . . . . . . . . . . . . 50 + 2.24. Explicit Congestion Notification (ECN) . . . . . . . . . 53 + + + +Kaufman, et al. Expires August 27, 2006 [Page 2] + +Internet-Draft IKEv2bis February 2006 + + + 3. Header and Payload Formats . . . . . . . . . . . . . . . . . 53 + 3.1. The IKE Header . . . . . . . . . . . . . . . . . . . . . 53 + 3.2. Generic Payload Header . . . . . . . . . . . . . . . . . 56 + 3.3. Security Association Payload . . . . . . . . . . . . . . 58 + 3.3.1. Proposal Substructure . . . . . . . . . . . . . . . . 60 + 3.3.2. Transform Substructure . . . . . . . . . . . . . . . 62 + 3.3.3. Valid Transform Types by Protocol . . . . . . . . . . 64 + 3.3.4. Mandatory Transform IDs . . . . . . . . . . . . . . . 65 + 3.3.5. Transform Attributes . . . . . . . . . . . . . . . . 66 + 3.3.6. Attribute Negotiation . . . . . . . . . . . . . . . . 67 + 3.4. Key Exchange Payload . . . . . . . . . . . . . . . . . . 68 + 3.5. Identification Payloads . . . . . . . . . . . . . . . . . 69 + 3.6. Certificate Payload . . . . . . . . . . . . . . . . . . . 71 + 3.7. Certificate Request Payload . . . . . . . . . . . . . . . 74 + 3.8. Authentication Payload . . . . . . . . . . . . . . . . . 76 + 3.9. Nonce Payload . . . . . . . . . . . . . . . . . . . . . . 77 + 3.10. Notify Payload . . . . . . . . . . . . . . . . . . . . . 77 + 3.10.1. Notify Message Types . . . . . . . . . . . . . . . . 78 + 3.11. Delete Payload . . . . . . . . . . . . . . . . . . . . . 84 + 3.12. Vendor ID Payload . . . . . . . . . . . . . . . . . . . . 85 + 3.13. Traffic Selector Payload . . . . . . . . . . . . . . . . 86 + 3.13.1. Traffic Selector . . . . . . . . . . . . . . . . . . 88 + 3.14. Encrypted Payload . . . . . . . . . . . . . . . . . . . . 90 + 3.15. Configuration Payload . . . . . . . . . . . . . . . . . . 92 + 3.15.1. Configuration Attributes . . . . . . . . . . . . . . 94 + 3.15.2. Meaning of INTERNAL_IP4_SUBNET/INTERNAL_IP6_SUBNET . 97 + 3.15.3. Configuration payloads for IPv6 . . . . . . . . . . . 99 + 3.15.4. Address Assignment Failures . . . . . . . . . . . . . 100 + 3.16. Extensible Authentication Protocol (EAP) Payload . . . . 100 + 4. Conformance Requirements . . . . . . . . . . . . . . . . . . 102 + 5. Security Considerations . . . . . . . . . . . . . . . . . . . 104 + 5.1. Traffic selector authorization . . . . . . . . . . . . . 107 + 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 108 + 7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 108 + 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 109 + 8.1. Normative References . . . . . . . . . . . . . . . . . . 109 + 8.2. Informative References . . . . . . . . . . . . . . . . . 110 + Appendix A. Summary of changes from IKEv1 . . . . . . . . . . . 114 + Appendix B. Diffie-Hellman Groups . . . . . . . . . . . . . . . 115 + B.1. Group 1 - 768 Bit MODP . . . . . . . . . . . . . . . . . 115 + B.2. Group 2 - 1024 Bit MODP . . . . . . . . . . . . . . . . . 115 + Appendix C. Exchanges and Payloads . . . . . . . . . . . . . . . 116 + C.1. IKE_SA_INIT Exchange . . . . . . . . . . . . . . . . . . 116 + C.2. IKE_AUTH Exchange without EAP . . . . . . . . . . . . . . 117 + C.3. IKE_AUTH Exchange with EAP . . . . . . . . . . . . . . . 118 + C.4. CREATE_CHILD_SA Exchange for Creating or Rekeying + CHILD_SAs . . . . . . . . . . . . . . . . . . . . . . . . 119 + C.5. CREATE_CHILD_SA Exchange for Rekeying the IKE_SA . . . . 119 + + + +Kaufman, et al. Expires August 27, 2006 [Page 3] + +Internet-Draft IKEv2bis February 2006 + + + C.6. INFORMATIONAL Exchange . . . . . . . . . . . . . . . . . 119 + Appendix D. Changes Between Internet Draft Versions . . . . . . 119 + D.1. Changes from IKEv2 to draft -00 . . . . . . . . . . . . . 119 + Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 120 + Intellectual Property and Copyright Statements . . . . . . . . . 120 + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 4] + +Internet-Draft IKEv2bis February 2006 + + +1. Introduction + + {{ An introduction to the differences between RFC 4306 [IKEV2] and + this document is given at the end of Section 1. It is put there + (instead of here) to preserve the section numbering of the original + IKEv2 document. }} + + IP Security (IPsec) provides confidentiality, data integrity, access + control, and data source authentication to IP datagrams. These + services are provided by maintaining shared state between the source + and the sink of an IP datagram. This state defines, among other + things, the specific services provided to the datagram, which + cryptographic algorithms will be used to provide the services, and + the keys used as input to the cryptographic algorithms. + + Establishing this shared state in a manual fashion does not scale + well. Therefore, a protocol to establish this state dynamically is + needed. This memo describes such a protocol -- the Internet Key + Exchange (IKE). Version 1 of IKE was defined in RFCs 2407 [DOI], + 2408 [ISAKMP], and 2409 [IKEV1]. IKEv2 was defined in [IKEV2]. This + single document is intended to replace all three of those RFCs. + + Definitions of the primitive terms in this document (such as Security + Association or SA) can be found in [IPSECARCH]. {{ Clarif-7.2 }} It + should be noted that parts of IKEv2 rely on some of the processing + rules in [IPSECARCH], as described in various sections of this + document. + + IKE performs mutual authentication between two parties and + establishes an IKE security association (SA) that includes shared + secret information that can be used to efficiently establish SAs for + Encapsulating Security Payload (ESP) [ESP] and/or Authentication + Header (AH) [AH] and a set of cryptographic algorithms to be used by + the SAs to protect the traffic that they carry. In this document, + the term "suite" or "cryptographic suite" refers to a complete set of + algorithms used to protect an SA. An initiator proposes one or more + suites by listing supported algorithms that can be combined into + suites in a mix-and-match fashion. IKE can also negotiate use of IP + Compression (IPComp) [IPCOMP] in connection with an ESP and/or AH SA. + We call the IKE SA an "IKE_SA". The SAs for ESP and/or AH that get + set up through that IKE_SA we call "CHILD_SAs". + + All IKE communications consist of pairs of messages: a request and a + response. The pair is called an "exchange". We call the first + messages establishing an IKE_SA IKE_SA_INIT and IKE_AUTH exchanges + and subsequent IKE exchanges CREATE_CHILD_SA or INFORMATIONAL + exchanges. In the common case, there is a single IKE_SA_INIT + exchange and a single IKE_AUTH exchange (a total of four messages) to + + + +Kaufman, et al. Expires August 27, 2006 [Page 5] + +Internet-Draft IKEv2bis February 2006 + + + establish the IKE_SA and the first CHILD_SA. In exceptional cases, + there may be more than one of each of these exchanges. In all cases, + all IKE_SA_INIT exchanges MUST complete before any other exchange + type, then all IKE_AUTH exchanges MUST complete, and following that + any number of CREATE_CHILD_SA and INFORMATIONAL exchanges may occur + in any order. In some scenarios, only a single CHILD_SA is needed + between the IPsec endpoints, and therefore there would be no + additional exchanges. Subsequent exchanges MAY be used to establish + additional CHILD_SAs between the same authenticated pair of endpoints + and to perform housekeeping functions. + + IKE message flow always consists of a request followed by a response. + It is the responsibility of the requester to ensure reliability. If + the response is not received within a timeout interval, the requester + needs to retransmit the request (or abandon the connection). + + The first request/response of an IKE session (IKE_SA_INIT) negotiates + security parameters for the IKE_SA, sends nonces, and sends Diffie- + Hellman values. + + The second request/response (IKE_AUTH) transmits identities, proves + knowledge of the secrets corresponding to the two identities, and + sets up an SA for the first (and often only) AH and/or ESP CHILD_SA. + + The types of subsequent exchanges are CREATE_CHILD_SA (which creates + a CHILD_SA) and INFORMATIONAL (which deletes an SA, reports error + conditions, or does other housekeeping). Every request requires a + response. An INFORMATIONAL request with no payloads (other than the + empty Encrypted payload required by the syntax) is commonly used as a + check for liveness. These subsequent exchanges cannot be used until + the initial exchanges have completed. + + In the description that follows, we assume that no errors occur. + Modifications to the flow should errors occur are described in + Section 2.21. + +1.1. Usage Scenarios + + IKE is expected to be used to negotiate ESP and/or AH SAs in a number + of different scenarios, each with its own special requirements. + + + + + + + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 6] + +Internet-Draft IKEv2bis February 2006 + + +1.1.1. Security Gateway to Security Gateway Tunnel + + +-+-+-+-+-+ +-+-+-+-+-+ + ! ! IPsec ! ! + Protected !Tunnel ! tunnel !Tunnel ! Protected + Subnet <-->!Endpoint !<---------->!Endpoint !<--> Subnet + ! ! ! ! + +-+-+-+-+-+ +-+-+-+-+-+ + + Figure 1: Security Gateway to Security Gateway Tunnel + + In this scenario, neither endpoint of the IP connection implements + IPsec, but network nodes between them protect traffic for part of the + way. Protection is transparent to the endpoints, and depends on + ordinary routing to send packets through the tunnel endpoints for + processing. Each endpoint would announce the set of addresses + "behind" it, and packets would be sent in tunnel mode where the inner + IP header would contain the IP addresses of the actual endpoints. + +1.1.2. Endpoint-to-Endpoint Transport + + +-+-+-+-+-+ +-+-+-+-+-+ + ! ! IPsec transport ! ! + !Protected! or tunnel mode SA !Protected! + !Endpoint !<---------------------------------------->!Endpoint ! + ! ! ! ! + +-+-+-+-+-+ +-+-+-+-+-+ + + Figure 2: Endpoint to Endpoint + + In this scenario, both endpoints of the IP connection implement + IPsec, as required of hosts in [IPSECARCH]. Transport mode will + commonly be used with no inner IP header. If there is an inner IP + header, the inner addresses will be the same as the outer addresses. + A single pair of addresses will be negotiated for packets to be + protected by this SA. These endpoints MAY implement application + layer access controls based on the IPsec authenticated identities of + the participants. This scenario enables the end-to-end security that + has been a guiding principle for the Internet since [ARCHPRINC], + [TRANSPARENCY], and a method of limiting the inherent problems with + complexity in networks noted by [ARCHGUIDEPHIL]. Although this + scenario may not be fully applicable to the IPv4 Internet, it has + been deployed successfully in specific scenarios within intranets + using IKEv1. It should be more broadly enabled during the transition + to IPv6 and with the adoption of IKEv2. + + It is possible in this scenario that one or both of the protected + endpoints will be behind a network address translation (NAT) node, in + + + +Kaufman, et al. Expires August 27, 2006 [Page 7] + +Internet-Draft IKEv2bis February 2006 + + + which case the tunneled packets will have to be UDP encapsulated so + that port numbers in the UDP headers can be used to identify + individual endpoints "behind" the NAT (see Section 2.23). + +1.1.3. Endpoint to Security Gateway Tunnel + + +-+-+-+-+-+ +-+-+-+-+-+ + ! ! IPsec ! ! Protected + !Protected! tunnel !Tunnel ! Subnet + !Endpoint !<------------------------>!Endpoint !<--- and/or + ! ! ! ! Internet + +-+-+-+-+-+ +-+-+-+-+-+ + + Figure 3: Endpoint to Security Gateway Tunnel + + In this scenario, a protected endpoint (typically a portable roaming + computer) connects back to its corporate network through an IPsec- + protected tunnel. It might use this tunnel only to access + information on the corporate network, or it might tunnel all of its + traffic back through the corporate network in order to take advantage + of protection provided by a corporate firewall against Internet-based + attacks. In either case, the protected endpoint will want an IP + address associated with the security gateway so that packets returned + to it will go to the security gateway and be tunneled back. This IP + address may be static or may be dynamically allocated by the security + gateway. {{ Clarif-6.1 }} In support of the latter case, IKEv2 + includes a mechanism (namely, configuration payloads) for the + initiator to request an IP address owned by the security gateway for + use for the duration of its SA. + + In this scenario, packets will use tunnel mode. On each packet from + the protected endpoint, the outer IP header will contain the source + IP address associated with its current location (i.e., the address + that will get traffic routed to the endpoint directly), while the + inner IP header will contain the source IP address assigned by the + security gateway (i.e., the address that will get traffic routed to + the security gateway for forwarding to the endpoint). The outer + destination address will always be that of the security gateway, + while the inner destination address will be the ultimate destination + for the packet. + + In this scenario, it is possible that the protected endpoint will be + behind a NAT. In that case, the IP address as seen by the security + gateway will not be the same as the IP address sent by the protected + endpoint, and packets will have to be UDP encapsulated in order to be + routed properly. + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 8] + +Internet-Draft IKEv2bis February 2006 + + +1.1.4. Other Scenarios + + Other scenarios are possible, as are nested combinations of the + above. One notable example combines aspects of 1.1.1 and 1.1.3. A + subnet may make all external accesses through a remote security + gateway using an IPsec tunnel, where the addresses on the subnet are + routed to the security gateway by the rest of the Internet. An + example would be someone's home network being virtually on the + Internet with static IP addresses even though connectivity is + provided by an ISP that assigns a single dynamically assigned IP + address to the user's security gateway (where the static IP addresses + and an IPsec relay are provided by a third party located elsewhere). + +1.2. The Initial Exchanges + + Communication using IKE always begins with IKE_SA_INIT and IKE_AUTH + exchanges (known in IKEv1 as Phase 1). These initial exchanges + normally consist of four messages, though in some scenarios that + number can grow. All communications using IKE consist of request/ + response pairs. We'll describe the base exchange first, followed by + variations. The first pair of messages (IKE_SA_INIT) negotiate + cryptographic algorithms, exchange nonces, and do a Diffie-Hellman + exchange [DH]. + + The second pair of messages (IKE_AUTH) authenticate the previous + messages, exchange identities and certificates, and establish the + first CHILD_SA. Parts of these messages are encrypted and integrity + protected with keys established through the IKE_SA_INIT exchange, so + the identities are hidden from eavesdroppers and all fields in all + the messages are authenticated. + + In the following descriptions, the payloads contained in the message + are indicated by names as listed below. + + + + + + + + + + + + + + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 9] + +Internet-Draft IKEv2bis February 2006 + + + Notation Payload + ----------------------------------------- + AUTH Authentication + CERT Certificate + CERTREQ Certificate Request + CP Configuration + D Delete + E Encrypted + EAP Extensible Authentication + HDR IKE Header + IDi Identification - Initiator + IDr Identification - Responder + KE Key Exchange + Ni, Nr Nonce + N Notify + SA Security Association + TSi Traffic Selector - Initiator + TSr Traffic Selector - Responder + V Vendor ID + + The details of the contents of each payload are described in section + 3. Payloads that may optionally appear will be shown in brackets, + such as [CERTREQ], indicate that optionally a certificate request + payload can be included. + + {{ Clarif-7.10 }} Many payloads contain fields marked as "RESERVED". + Some payloads in IKEv2 (and historically in IKEv1) are not aligned to + 4-byte boundaries. + + The initial exchanges are as follows: + + Initiator Responder + ------------------------------------------------------------------- + HDR, SAi1, KEi, Ni --> + + HDR contains the Security Parameter Indexes (SPIs), version numbers, + and flags of various sorts. The SAi1 payload states the + cryptographic algorithms the initiator supports for the IKE_SA. The + KE payload sends the initiator's Diffie-Hellman value. Ni is the + initiator's nonce. + + <-- HDR, SAr1, KEr, Nr, [CERTREQ] + + The responder chooses a cryptographic suite from the initiator's + offered choices and expresses that choice in the SAr1 payload, + completes the Diffie-Hellman exchange with the KEr payload, and sends + its nonce in the Nr payload. + + + + +Kaufman, et al. Expires August 27, 2006 [Page 10] + +Internet-Draft IKEv2bis February 2006 + + + At this point in the negotiation, each party can generate SKEYSEED, + from which all keys are derived for that IKE_SA. All but the headers + of all the messages that follow are encrypted and integrity + protected. The keys used for the encryption and integrity protection + are derived from SKEYSEED and are known as SK_e (encryption) and SK_a + (authentication, a.k.a. integrity protection). A separate SK_e and + SK_a is computed for each direction. In addition to the keys SK_e + and SK_a derived from the DH value for protection of the IKE_SA, + another quantity SK_d is derived and used for derivation of further + keying material for CHILD_SAs. The notation SK { ... } indicates + that these payloads are encrypted and integrity protected using that + direction's SK_e and SK_a. + + HDR, SK {IDi, [CERT,] [CERTREQ,] + [IDr,] AUTH, SAi2, + TSi, TSr} --> + + The initiator asserts its identity with the IDi payload, proves + knowledge of the secret corresponding to IDi and integrity protects + the contents of the first message using the AUTH payload (see + Section 2.15). It might also send its certificate(s) in CERT + payload(s) and a list of its trust anchors in CERTREQ payload(s). If + any CERT payloads are included, the first certificate provided MUST + contain the public key used to verify the AUTH field. The optional + payload IDr enables the initiator to specify which of the responder's + identities it wants to talk to. This is useful when the machine on + which the responder is running is hosting multiple identities at the + same IP address. The initiator begins negotiation of a CHILD_SA + using the SAi2 payload. The final fields (starting with SAi2) are + described in the description of the CREATE_CHILD_SA exchange. + + <-- HDR, SK {IDr, [CERT,] AUTH, + SAr2, TSi, TSr} + + The responder asserts its identity with the IDr payload, optionally + sends one or more certificates (again with the certificate containing + the public key used to verify AUTH listed first), authenticates its + identity and protects the integrity of the second message with the + AUTH payload, and completes negotiation of a CHILD_SA with the + additional fields described below in the CREATE_CHILD_SA exchange. + + The recipients of messages 3 and 4 MUST verify that all signatures + and MACs are computed correctly and that the names in the ID payloads + correspond to the keys used to generate the AUTH payload. + + {{ Clarif-4.2}} If creating the CHILD_SA during the IKE_AUTH exchange + fails for some reason, the IKE_SA is still created as usual. The + list of responses in the IKE_AUTH exchange that do not prevent an + + + +Kaufman, et al. Expires August 27, 2006 [Page 11] + +Internet-Draft IKEv2bis February 2006 + + + IKE_SA from being set up include at least the following: + NO_PROPOSAL_CHOSEN, TS_UNACCEPTABLE, SINGLE_PAIR_REQUIRED, + INTERNAL_ADDRESS_FAILURE, and FAILED_CP_REQUIRED. + + {{ Clarif-4.3 }} Note that IKE_AUTH messages do not contain KEi/KEr + or Ni/Nr payloads. Thus, the SA payload in IKE_AUTH exchange cannot + contain Transform Type 4 (Diffie-Hellman Group) with any value other + than NONE. Implementations SHOULD NOT send such a transform because + it cannot be interpreted consistently, and implementations SHOULD + ignore any such tranforms they receive. + +1.3. The CREATE_CHILD_SA Exchange + + {{ This is a heavy rewrite of most of this section. The major + organization changes are described in Clarif-4.1 and Clarif-5.1. }} + + The CREATE_CHILD_SA exchange is used to create new CHILD_SAs and to + rekey both IKE_SAs and CHILD_SAs. This exchange consists of a single + request/response pair, and some of its function was referred to as a + phase 2 exchange in IKEv1. It MAY be initiated by either end of the + IKE_SA after the initial exchanges are completed. + + All messages following the initial exchange are cryptographically + protected using the cryptographic algorithms and keys negotiated in + the first two messages of the IKE exchange. These subsequent + messages use the syntax of the Encrypted Payload described in + Section 3.14. All subsequent messages include an Encrypted Payload, + even if they are referred to in the text as "empty". For both + messages in the CREATE_CHILD_SA, the message following the header is + encrypted and the message including the header is integrity protected + using the cryptographic algorithms negotiated for the IKE_SA. + + The CREATE_CHILD_SA is also used for rekeying IKE_SAs and CHILD_SAs. + An SA is rekeyed by creating a new SA and then deleting the old one. + This section describes the first part of rekeying, the creation of + new SAs; Section 2.8 covers the mechanics of rekeying, including + moving traffic from old to new SAs and the deletion of the old SAs. + The two sections must be read together to understand the entire + process of rekeying. + + Either endpoint may initiate a CREATE_CHILD_SA exchange, so in this + section the term initiator refers to the endpoint initiating this + exchange. An implementation MAY refuse all CREATE_CHILD_SA requests + within an IKE_SA. + + The CREATE_CHILD_SA request MAY optionally contain a KE payload for + an additional Diffie-Hellman exchange to enable stronger guarantees + of forward secrecy for the CHILD_SA. The keying material for the + + + +Kaufman, et al. Expires August 27, 2006 [Page 12] + +Internet-Draft IKEv2bis February 2006 + + + CHILD_SA is a function of SK_d established during the establishment + of the IKE_SA, the nonces exchanged during the CREATE_CHILD_SA + exchange, and the Diffie-Hellman value (if KE payloads are included + in the CREATE_CHILD_SA exchange). + + If a CREATE_CHILD_SA exchange includes a KEi payload, at least one of + the SA offers MUST include the Diffie-Hellman group of the KEi. The + Diffie-Hellman group of the KEi MUST be an element of the group the + initiator expects the responder to accept (additional Diffie-Hellman + groups can be proposed). If the responder rejects the Diffie-Hellman + group of the KEi payload, the responder MUST reject the request and + indicate its preferred Diffie-Hellman group in the INVALID_KE_PAYLOAD + Notification payload. In the case of such a rejection, the + CREATE_CHILD_SA exchange fails, and the initiator will probably retry + the exchange with a Diffie-Hellman proposal and KEi in the group that + the responder gave in the INVALID_KE_PAYLOAD. + +1.3.1. Creating New CHILD_SAs with the CREATE_CHILD_SA Exchange + + A CHILD_SA may be created by sending a CREATE_CHILD_SA request. The + CREATE_CHILD_SA request for creating a new CHILD_SA is: + + Initiator Responder + ------------------------------------------------------------------- + HDR, SK {SA, Ni, [KEi], + TSi, TSr} --> + + The initiator sends SA offer(s) in the SA payload, a nonce in the Ni + payload, optionally a Diffie-Hellman value in the KEi payload, and + the proposed traffic selectors for the proposed CHILD_SA in the TSi + and TSr payloads. + + The CREATE_CHILD_SA response for creating a new CHILD_SA is: + + <-- HDR, SK {SA, Nr, [KEr], + TSi, TSr} + + The responder replies (using the same Message ID to respond) with the + accepted offer in an SA payload, and a Diffie-Hellman value in the + KEr payload if KEi was included in the request and the selected + cryptographic suite includes that group. + + The traffic selectors for traffic to be sent on that SA are specified + in the TS payloads in the response, which may be a subset of what the + initiator of the CHILD_SA proposed. + + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 13] + +Internet-Draft IKEv2bis February 2006 + + +1.3.2. Rekeying IKE_SAs with the CREATE_CHILD_SA Exchange + + The CREATE_CHILD_SA request for rekeying an IKE_SA is: + + Initiator Responder + ------------------------------------------------------------------- + HDR, SK {SA, Ni, KEi} --> + + The initiator sends SA offer(s) in the SA payload, a nonce in the Ni + payload, and a Diffie-Hellman value in the KEi payload. New + initiator and responder SPIs are supplied in the SPI fields. + + The CREATE_CHILD_SA response for rekeying an IKE_SA is: + + <-- HDR, SK {SA, Nr, KEr} + + The responder replies (using the same Message ID to respond) with the + accepted offer in an SA payload, and a Diffie-Hellman value in the + KEr payload if the selected cryptographic suite includes that group. + + The new IKE_SA has its message counters set to 0, regardless of what + they were in the earlier IKE_SA. The window size starts at 1 for any + new IKE_SA. + + KEi and KEr are required for rekeying an IKE_SA. + +1.3.3. Rekeying CHILD_SAs with the CREATE_CHILD_SA Exchange + + The CREATE_CHILD_SA request for rekeying a CHILD_SA is: + + Initiator Responder + ------------------------------------------------------------------- + HDR, SK {N, SA, Ni, [KEi], + TSi, TSr} --> + + The initiator sends SA offer(s) in the SA payload, a nonce in the Ni + payload, optionally a Diffie-Hellman value in the KEi payload, and + the proposed traffic selectors for the proposed CHILD_SA in the TSi + and TSr payloads. When rekeying an existing CHILD_SA, the leading N + payload of type REKEY_SA MUST be included and MUST give the SPI (as + they would be expected in the headers of inbound packets) of the SAs + being rekeyed. + + The CREATE_CHILD_SA response for rekeying a CHILD_SA is: + + <-- HDR, SK {SA, Nr, [KEr], + Si, TSr} + + + + +Kaufman, et al. Expires August 27, 2006 [Page 14] + +Internet-Draft IKEv2bis February 2006 + + + The responder replies (using the same Message ID to respond) with the + accepted offer in an SA payload, and a Diffie-Hellman value in the + KEr payload if KEi was included in the request and the selected + cryptographic suite includes that group. + + The traffic selectors for traffic to be sent on that SA are specified + in the TS payloads in the response, which may be a subset of what the + initiator of the CHILD_SA proposed. + +1.4. The INFORMATIONAL Exchange + + At various points during the operation of an IKE_SA, peers may desire + to convey control messages to each other regarding errors or + notifications of certain events. To accomplish this, IKE defines an + INFORMATIONAL exchange. INFORMATIONAL exchanges MUST ONLY occur + after the initial exchanges and are cryptographically protected with + the negotiated keys. + + Control messages that pertain to an IKE_SA MUST be sent under that + IKE_SA. Control messages that pertain to CHILD_SAs MUST be sent + under the protection of the IKE_SA which generated them (or its + successor if the IKE_SA was replaced for the purpose of rekeying). + + Messages in an INFORMATIONAL exchange contain zero or more + Notification, Delete, and Configuration payloads. The Recipient of + an INFORMATIONAL exchange request MUST send some response (else the + Sender will assume the message was lost in the network and will + retransmit it). That response MAY be a message with no payloads. + The request message in an INFORMATIONAL exchange MAY also contain no + payloads. This is the expected way an endpoint can ask the other + endpoint to verify that it is alive. + + {{ Clarif-5.6 }} ESP and AH SAs always exist in pairs, with one SA in + each direction. When an SA is closed, both members of the pair MUST + be closed (that is, deleted). When SAs are nested, as when data (and + IP headers if in tunnel mode) are encapsulated first with IPComp, + then with ESP, and finally with AH between the same pair of + endpoints, all of the SAs MUST be deleted together. Each endpoint + MUST close its incoming SAs and allow the other endpoint to close the + other SA in each pair. To delete an SA, an INFORMATIONAL exchange + with one or more delete payloads is sent listing the SPIs (as they + would be expected in the headers of inbound packets) of the SAs to be + deleted. The recipient MUST close the designated SAs. {{ Clarif-5.7 + }} Note that one never sends delete payloads for the two sides of an + SA in a single message. If there are many SAs to delete at the same + time (such as for nested SAs), one includes delete payloads for in + inbound half of each SA pair in your Informational exchange. + + + + +Kaufman, et al. Expires August 27, 2006 [Page 15] + +Internet-Draft IKEv2bis February 2006 + + + Normally, the reply in the INFORMATIONAL exchange will contain delete + payloads for the paired SAs going in the other direction. There is + one exception. If by chance both ends of a set of SAs independently + decide to close them, each may send a delete payload and the two + requests may cross in the network. If a node receives a delete + request for SAs for which it has already issued a delete request, it + MUST delete the outgoing SAs while processing the request and the + incoming SAs while processing the response. In that case, the + responses MUST NOT include delete payloads for the deleted SAs, since + that would result in duplicate deletion and could in theory delete + the wrong SA. + + {{ Demoted the SHOULD }} Half-closed connections are anomalous, and a + node with auditing capability should probably audit their existence + if they persist. Note that this specification nowhere specifies time + periods, so it is up to individual endpoints to decide how long to + wait. A node MAY refuse to accept incoming data on half-closed + connections but MUST NOT unilaterally close them and reuse the SPIs. + If connection state becomes sufficiently messed up, a node MAY close + the IKE_SA; doing so will implicitly close all SAs negotiated under + it. It can then rebuild the SAs it needs on a clean base under a new + IKE_SA. {{ Clarif-5.8 }} The response to a request that deletes the + IKE_SA is an empty Informational response. + + The INFORMATIONAL exchange is defined as: + + Initiator Responder + ------------------------------------------------------------------- + HDR, SK {[N,] [D,] + [CP,] ...} --> + <-- HDR, SK {[N,] [D,] + [CP], ...} + + The processing of an INFORMATIONAL exchange is determined by its + component payloads. + +1.5. Informational Messages outside of an IKE_SA + + If an encrypted IKE packet arrives on port 500 or 4500 with an + unrecognized SPI, it could be because the receiving node has recently + crashed and lost state or because of some other system malfunction or + attack. If the receiving node has an active IKE_SA to the IP address + from whence the packet came, it MAY send a notification of the + wayward packet over that IKE_SA in an INFORMATIONAL exchange. If it + does not have such an IKE_SA, it MAY send an Informational message + without cryptographic protection to the source IP address. Such a + message is not part of an informational exchange, and the receiving + node MUST NOT respond to it. Doing so could cause a message loop. + + + +Kaufman, et al. Expires August 27, 2006 [Page 16] + +Internet-Draft IKEv2bis February 2006 + + + {{ Clarif-7.7 }} There are two cases when such a one-way notification + is sent: INVALID_IKE_SPI and INVALID_SPI. These notifications are + sent outside of an IKE_SA. Note that such notifications are + explicitly not Informational exchanges; these are one-way messages + that must not be responded to. In case of INVALID_IKE_SPI, the + message sent is a response message, and thus it is sent to the IP + address and port from whence it came with the same IKE SPIs and the + Message ID copied. In case of INVALID_SPI, however, there are no IKE + SPI values that would be meaningful to the recipient of such a + notification. Using zero values or random values are both + acceptable. + +1.6. Requirements Terminology + + Keywords "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT" and + "MAY" that appear in this document are to be interpreted as described + in [MUSTSHOULD]. + + The term "Expert Review" is to be interpreted as defined in + [IANACONS]. + +1.7. Differences Between RFC 4306 and This Document + + {{ Added this entire section, including this recursive remark. }} + + This document contains clarifications and amplifications to IKEv2 + [IKEV2]. The clarifications are mostly based on [Clarif]. The + changes listed in that document were discussed in the IPsec Working + Group and, after the Working Group was disbanded, on the IPsec + mailing list. That document contains detailed explanations of areas + that were unclear in IKEv2, and is thus useful to implementers of + IKEv2. + + The protocol described in this document retains the same major + version number (2) and minor version number (0) as was used in RFC + 4306. + + In the body of this document, notes that are enclosed in double curly + braces {{ such as this }} point out changes from IKEv2. Changes that + come from [Clarif] are marked with the section from that document, + such as "{{ Clarif-2.10 }}". + + This document also make the figures and references a bit more regular + than in [IKEV2]. + + IKEv2 developers have noted that the SHOULD-level requirements are + often unclear in that they don't say when it is OK to not obey the + requirements. They also have noted that there are MUST-level + + + +Kaufman, et al. Expires August 27, 2006 [Page 17] + +Internet-Draft IKEv2bis February 2006 + + + requirements that are not related to interoperability. This document + has more explanation of some of these requirements. All non- + capitalized uses of the words SHOULD and MUST now mean their normal + English sense, not the interoperability sense of [MUSTSHOULD]. + + IKEv2 (and IKEv1) developers have noted that there is a great deal of + material in the tables of codes in Section 3.10. This leads to + implementers not having all the needed information in the main body + of the docment. A later version of this document may move much of + the material from those tables into the associated parts of the main + body of the document. + + A later version of this document will probably have all the {{ }} + comments removed from the body of the document and instead appear in + an appendix. + + +2. IKE Protocol Details and Variations + + IKE normally listens and sends on UDP port 500, though IKE messages + may also be received on UDP port 4500 with a slightly different + format (see Section 2.23). Since UDP is a datagram (unreliable) + protocol, IKE includes in its definition recovery from transmission + errors, including packet loss, packet replay, and packet forgery. + IKE is designed to function so long as (1) at least one of a series + of retransmitted packets reaches its destination before timing out; + and (2) the channel is not so full of forged and replayed packets so + as to exhaust the network or CPU capacities of either endpoint. Even + in the absence of those minimum performance requirements, IKE is + designed to fail cleanly (as though the network were broken). + + Although IKEv2 messages are intended to be short, they contain + structures with no hard upper bound on size (in particular, X.509 + certificates), and IKEv2 itself does not have a mechanism for + fragmenting large messages. IP defines a mechanism for fragmentation + of oversize UDP messages, but implementations vary in the maximum + message size supported. Furthermore, use of IP fragmentation opens + an implementation to denial of service attacks [DOSUDPPROT]. + Finally, some NAT and/or firewall implementations may block IP + fragments. + + All IKEv2 implementations MUST be able to send, receive, and process + IKE messages that are up to 1280 bytes long, and they SHOULD be able + to send, receive, and process messages that are up to 3000 bytes + long. {{ Demoted the SHOULD }} IKEv2 implementations need to be aware + of the maximum UDP message size supported and MAY shorten messages by + leaving out some certificates or cryptographic suite proposals if + that will keep messages below the maximum. Use of the "Hash and URL" + + + +Kaufman, et al. Expires August 27, 2006 [Page 18] + +Internet-Draft IKEv2bis February 2006 + + + formats rather than including certificates in exchanges where + possible can avoid most problems. {{ Demoted the SHOULD }} + Implementations and configuration need to keep in mind, however, that + if the URL lookups are possible only after the IPsec SA is + established, recursion issues could prevent this technique from + working. + + {{ Clarif-7.5 }} All packets sent on port 4500 MUST begin with the + prefix of four zeros; otherwise, the receiver won't know how to + handle them. + +2.1. Use of Retransmission Timers + + All messages in IKE exist in pairs: a request and a response. The + setup of an IKE_SA normally consists of two request/response pairs. + Once the IKE_SA is set up, either end of the security association may + initiate requests at any time, and there can be many requests and + responses "in flight" at any given moment. But each message is + labeled as either a request or a response, and for each request/ + response pair one end of the security association is the initiator + and the other is the responder. + + For every pair of IKE messages, the initiator is responsible for + retransmission in the event of a timeout. The responder MUST never + retransmit a response unless it receives a retransmission of the + request. In that event, the responder MUST ignore the retransmitted + request except insofar as it triggers a retransmission of the + response. The initiator MUST remember each request until it receives + the corresponding response. The responder MUST remember each + response until it receives a request whose sequence number is larger + than the sequence number in the response plus its window size (see + Section 2.3). + + IKE is a reliable protocol, in the sense that the initiator MUST + retransmit a request until either it receives a corresponding reply + OR it deems the IKE security association to have failed and it + discards all state associated with the IKE_SA and any CHILD_SAs + negotiated using that IKE_SA. + +2.2. Use of Sequence Numbers for Message ID + + Every IKE message contains a Message ID as part of its fixed header. + This Message ID is used to match up requests and responses, and to + identify retransmissions of messages. + + The Message ID is a 32-bit quantity, which is zero for the first IKE + request in each direction. {{ Clarif-3.10 }} When the IKE_AUTH + exchange does not use EAP, the IKE_SA initial setup messages will + + + +Kaufman, et al. Expires August 27, 2006 [Page 19] + +Internet-Draft IKEv2bis February 2006 + + + always be numbered 0 and 1. When EAP is used, each pair of messages + have their message numbers incremented; the first pair of AUTH + messages will have an ID of 1, the second will be 2, and so on. + + Each endpoint in the IKE Security Association maintains two "current" + Message IDs: the next one to be used for a request it initiates and + the next one it expects to see in a request from the other end. + These counters increment as requests are generated and received. + Responses always contain the same message ID as the corresponding + request. That means that after the initial exchange, each integer n + may appear as the message ID in four distinct messages: the nth + request from the original IKE initiator, the corresponding response, + the nth request from the original IKE responder, and the + corresponding response. If the two ends make very different numbers + of requests, the Message IDs in the two directions can be very + different. There is no ambiguity in the messages, however, because + the (I)nitiator and (R)esponse bits in the message header specify + which of the four messages a particular one is. + + {{ Clarif-2.2 }} The Message ID for IKE_SA_INIT messages is always + zero, including for retries of the message due to responses such as + COOKIE and INVALID_KE_PAYLOAD. + + Note that Message IDs are cryptographically protected and provide + protection against message replays. In the unlikely event that + Message IDs grow too large to fit in 32 bits, the IKE_SA MUST be + closed. Rekeying an IKE_SA resets the sequence numbers. + + {{ Clarif-2.3 }} When a responder receives an IKE_SA_INIT request, it + has to determine whether the packet is a retransmission belonging to + an existing "half-open" IKE_SA (in which case the responder + retransmits the same response), or a new request (in which case the + responder creates a new IKE_SA and sends a fresh response), or it is + a retransmission of a now-opened IKE_SA (in whcih case the responder + ignores it). It is not sufficient to use the initiator's SPI and/or + IP address to differentiate between the two cases because two + different peers behind a single NAT could choose the same initiator + SPI. Instead, a robust responder will do the IKE_SA lookup using the + whole packet, its hash, or the Ni payload. + +2.3. Window Size for Overlapping Requests + + In order to maximize IKE throughput, an IKE endpoint MAY issue + multiple requests before getting a response to any of them if the + other endpoint has indicated its ability to handle such requests. + For simplicity, an IKE implementation MAY choose to process requests + strictly in order and/or wait for a response to one request before + issuing another. Certain rules must be followed to ensure + + + +Kaufman, et al. Expires August 27, 2006 [Page 20] + +Internet-Draft IKEv2bis February 2006 + + + interoperability between implementations using different strategies. + + After an IKE_SA is set up, either end can initiate one or more + requests. These requests may pass one another over the network. An + IKE endpoint MUST be prepared to accept and process a request while + it has a request outstanding in order to avoid a deadlock in this + situation. {{ Downgraded the SHOULD }} An IKE endpoint may also + accept and process multiple requests while it has a request + outstanding. + + An IKE endpoint MUST wait for a response to each of its messages + before sending a subsequent message unless it has received a + SET_WINDOW_SIZE Notify message from its peer informing it that the + peer is prepared to maintain state for multiple outstanding messages + in order to allow greater throughput. + + An IKE endpoint MUST NOT exceed the peer's stated window size for + transmitted IKE requests. In other words, if the responder stated + its window size is N, then when the initiator needs to make a request + X, it MUST wait until it has received responses to all requests up + through request X-N. An IKE endpoint MUST keep a copy of (or be able + to regenerate exactly) each request it has sent until it receives the + corresponding response. An IKE endpoint MUST keep a copy of (or be + able to regenerate exactly) the number of previous responses equal to + its declared window size in case its response was lost and the + initiator requests its retransmission by retransmitting the request. + + An IKE endpoint supporting a window size greater than one ought to be + capable of processing incoming requests out of order to maximize + performance in the event of network failures or packet reordering. + + {{ Clarif-7.3 }} The window size is normally a (possibly + configurable) property of a particular implementation, and is not + related to congestion control (unlike the window size in TCP, for + example). In particular, it is not defined what the responder should + do when it receives a SET_WINDOW_SIZE notification containing a + smaller value than is currently in effect. Thus, there is currently + no way to reduce the window size of an existing IKE_SA; you can only + increase it. When rekeying an IKE_SA, the new IKE_SA starts with + window size 1 until it is explicitly increased by sending a new + SET_WINDOW_SIZE notification. + +2.4. State Synchronization and Connection Timeouts + + An IKE endpoint is allowed to forget all of its state associated with + an IKE_SA and the collection of corresponding CHILD_SAs at any time. + This is the anticipated behavior in the event of an endpoint crash + and restart. It is important when an endpoint either fails or + + + +Kaufman, et al. Expires August 27, 2006 [Page 21] + +Internet-Draft IKEv2bis February 2006 + + + reinitializes its state that the other endpoint detect those + conditions and not continue to waste network bandwidth by sending + packets over discarded SAs and having them fall into a black hole. + + Since IKE is designed to operate in spite of Denial of Service (DoS) + attacks from the network, an endpoint MUST NOT conclude that the + other endpoint has failed based on any routing information (e.g., + ICMP messages) or IKE messages that arrive without cryptographic + protection (e.g., Notify messages complaining about unknown SPIs). + An endpoint MUST conclude that the other endpoint has failed only + when repeated attempts to contact it have gone unanswered for a + timeout period or when a cryptographically protected INITIAL_CONTACT + notification is received on a different IKE_SA to the same + authenticated identity. {{ Demoted the SHOULD }} An endpoint should + suspect that the other endpoint has failed based on routing + information and initiate a request to see whether the other endpoint + is alive. To check whether the other side is alive, IKE specifies an + empty INFORMATIONAL message that (like all IKE requests) requires an + acknowledgement (note that within the context of an IKE_SA, an + "empty" message consists of an IKE header followed by an Encrypted + payload that contains no payloads). If a cryptographically protected + message has been received from the other side recently, unprotected + notifications MAY be ignored. Implementations MUST limit the rate at + which they take actions based on unprotected messages. + + Numbers of retries and lengths of timeouts are not covered in this + specification because they do not affect interoperability. It is + suggested that messages be retransmitted at least a dozen times over + a period of at least several minutes before giving up on an SA, but + different environments may require different rules. To be a good + network citizen, retranmission times MUST increase exponentially to + avoid flooding the network and making an existing congestion + situation worse. If there has only been outgoing traffic on all of + the SAs associated with an IKE_SA, it is essential to confirm + liveness of the other endpoint to avoid black holes. If no + cryptographically protected messages have been received on an IKE_SA + or any of its CHILD_SAs recently, the system needs to perform a + liveness check in order to prevent sending messages to a dead peer. + Receipt of a fresh cryptographically protected message on an IKE_SA + or any of its CHILD_SAs ensures liveness of the IKE_SA and all of its + CHILD_SAs. Note that this places requirements on the failure modes + of an IKE endpoint. An implementation MUST NOT continue sending on + any SA if some failure prevents it from receiving on all of the + associated SAs. If CHILD_SAs can fail independently from one another + without the associated IKE_SA being able to send a delete message, + then they MUST be negotiated by separate IKE_SAs. + + There is a Denial of Service attack on the initiator of an IKE_SA + + + +Kaufman, et al. Expires August 27, 2006 [Page 22] + +Internet-Draft IKEv2bis February 2006 + + + that can be avoided if the initiator takes the proper care. Since + the first two messages of an SA setup are not cryptographically + protected, an attacker could respond to the initiator's message + before the genuine responder and poison the connection setup attempt. + To prevent this, the initiator MAY be willing to accept multiple + responses to its first message, treat each as potentially legitimate, + respond to it, and then discard all the invalid half-open connections + when it receives a valid cryptographically protected response to any + one of its requests. Once a cryptographically valid response is + received, all subsequent responses should be ignored whether or not + they are cryptographically valid. + + Note that with these rules, there is no reason to negotiate and agree + upon an SA lifetime. If IKE presumes the partner is dead, based on + repeated lack of acknowledgement to an IKE message, then the IKE SA + and all CHILD_SAs set up through that IKE_SA are deleted. + + An IKE endpoint may at any time delete inactive CHILD_SAs to recover + resources used to hold their state. If an IKE endpoint chooses to + delete CHILD_SAs, it MUST send Delete payloads to the other end + notifying it of the deletion. It MAY similarly time out the IKE_SA. + {{ Clarified the SHOULD }} Closing the IKE_SA implicitly closes all + associated CHILD_SAs. In this case, an IKE endpoint SHOULD send a + Delete payload indicating that it has closed the IKE_SA unless the + other endpoint is no longer responding. + +2.5. Version Numbers and Forward Compatibility + + This document describes version 2.0 of IKE, meaning the major version + number is 2 and the minor version number is 0. {{ Restated the + relationship to RFC 4306 }} This document is a clarification of + [IKEV2]. It is likely that some implementations will want to support + version 1.0 and version 2.0, and in the future, other versions. + + The major version number should be incremented only if the packet + formats or required actions have changed so dramatically that an + older version node would not be able to interoperate with a newer + version node if it simply ignored the fields it did not understand + and took the actions specified in the older specification. The minor + version number indicates new capabilities, and MUST be ignored by a + node with a smaller minor version number, but used for informational + purposes by the node with the larger minor version number. For + example, it might indicate the ability to process a newly defined + notification message. The node with the larger minor version number + would simply note that its correspondent would not be able to + understand that message and therefore would not send it. + + If an endpoint receives a message with a higher major version number, + + + +Kaufman, et al. Expires August 27, 2006 [Page 23] + +Internet-Draft IKEv2bis February 2006 + + + it MUST drop the message and SHOULD send an unauthenticated + notification message containing the highest version number it + supports. If an endpoint supports major version n, and major version + m, it MUST support all versions between n and m. If it receives a + message with a major version that it supports, it MUST respond with + that version number. In order to prevent two nodes from being + tricked into corresponding with a lower major version number than the + maximum that they both support, IKE has a flag that indicates that + the node is capable of speaking a higher major version number. + + Thus, the major version number in the IKE header indicates the + version number of the message, not the highest version number that + the transmitter supports. If the initiator is capable of speaking + versions n, n+1, and n+2, and the responder is capable of speaking + versions n and n+1, then they will negotiate speaking n+1, where the + initiator will set the flag indicating its ability to speak a higher + version. If they mistakenly (perhaps through an active attacker + sending error messages) negotiate to version n, then both will notice + that the other side can support a higher version number, and they + MUST break the connection and reconnect using version n+1. + + Note that IKEv1 does not follow these rules, because there is no way + in v1 of noting that you are capable of speaking a higher version + number. So an active attacker can trick two v2-capable nodes into + speaking v1. {{ Demoted the SHOULD }} When a v2-capable node + negotiates down to v1, it should note that fact in its logs. + + Also for forward compatibility, all fields marked RESERVED MUST be + set to zero by an implementation running version 2.0 or later, and + their content MUST be ignored by an implementation running version + 2.0 or later ("Be conservative in what you send and liberal in what + you receive"). In this way, future versions of the protocol can use + those fields in a way that is guaranteed to be ignored by + implementations that do not understand them. Similarly, payload + types that are not defined are reserved for future use; + implementations of a version where they are undefined MUST skip over + those payloads and ignore their contents. + + IKEv2 adds a "critical" flag to each payload header for further + flexibility for forward compatibility. If the critical flag is set + and the payload type is unrecognized, the message MUST be rejected + and the response to the IKE request containing that payload MUST + include a Notify payload UNSUPPORTED_CRITICAL_PAYLOAD, indicating an + unsupported critical payload was included. If the critical flag is + not set and the payload type is unsupported, that payload MUST be + ignored. + + {{ Demoted the SHOULD in the second clause }}Although new payload + + + +Kaufman, et al. Expires August 27, 2006 [Page 24] + +Internet-Draft IKEv2bis February 2006 + + + types may be added in the future and may appear interleaved with the + fields defined in this specification, implementations MUST send the + payloads defined in this specification in the order shown in the + figures in Section 2; implementations are explicitly allowed to + reject as invalid a message with those payloads in any other order. + +2.6. Cookies + + The term "cookies" originates with Karn and Simpson [PHOTURIS] in + Photuris, an early proposal for key management with IPsec, and it has + persisted. The Internet Security Association and Key Management + Protocol (ISAKMP) [ISAKMP] fixed message header includes two eight- + octet fields titled "cookies", and that syntax is used by both IKEv1 + and IKEv2 though in IKEv2 they are referred to as the IKE SPI and + there is a new separate field in a Notify payload holding the cookie. + The initial two eight-octet fields in the header are used as a + connection identifier at the beginning of IKE packets. {{ Demoted the + SHOULD }} Each endpoint chooses one of the two SPIs and needs to + choose them so as to be unique identifiers of an IKE_SA. An SPI + value of zero is special and indicates that the remote SPI value is + not yet known by the sender. + + Unlike ESP and AH where only the recipient's SPI appears in the + header of a message, in IKE the sender's SPI is also sent in every + message. Since the SPI chosen by the original initiator of the + IKE_SA is always sent first, an endpoint with multiple IKE_SAs open + that wants to find the appropriate IKE_SA using the SPI it assigned + must look at the I(nitiator) Flag bit in the header to determine + whether it assigned the first or the second eight octets. + + In the first message of an initial IKE exchange, the initiator will + not know the responder's SPI value and will therefore set that field + to zero. + + An expected attack against IKE is state and CPU exhaustion, where the + target is flooded with session initiation requests from forged IP + addresses. This attack can be made less effective if an + implementation of a responder uses minimal CPU and commits no state + to an SA until it knows the initiator can receive packets at the + address from which it claims to be sending them. To accomplish this, + a responder SHOULD -- when it detects a large number of half-open + IKE_SAs -- reject initial IKE messages unless they contain a Notify + payload of type COOKIE. {{ Clarified the SHOULD }} If the responder + wants to set up an SA, it SHOULD instead send an unprotected IKE + message as a response and include COOKIE Notify payload with the + cookie data to be returned. Initiators who receive such responses + MUST retry the IKE_SA_INIT with a Notify payload of type COOKIE + containing the responder supplied cookie data as the first payload + + + +Kaufman, et al. Expires August 27, 2006 [Page 25] + +Internet-Draft IKEv2bis February 2006 + + + and all other payloads unchanged. The initial exchange will then be + as follows: + + Initiator Responder + ------------------------------------------------------------------- + HDR(A,0), SAi1, KEi, Ni --> + <-- HDR(A,0), N(COOKIE) + HDR(A,0), N(COOKIE), SAi1, + KEi, Ni --> + <-- HDR(A,B), SAr1, KEr, + Nr, [CERTREQ] + HDR(A,B), SK {IDi, [CERT,] + [CERTREQ,] [IDr,] AUTH, + SAi2, TSi, TSr} --> + <-- HDR(A,B), SK {IDr, [CERT,] + AUTH, SAr2, TSi, TSr} + + The first two messages do not affect any initiator or responder state + except for communicating the cookie. In particular, the message + sequence numbers in the first four messages will all be zero and the + message sequence numbers in the last two messages will be one. 'A' + is the SPI assigned by the initiator, while 'B' is the SPI assigned + by the responder. + + {{ Clarif-2.1 }} Because the responder's SPI identifies security- + related state held by the responder, and in this case no state is + created, the responder sends a zero value for the responder's SPI. + + {{ Demoted the SHOULD }} An IKE implementation should implement its + responder cookie generation in such a way as to not require any saved + state to recognize its valid cookie when the second IKE_SA_INIT + message arrives. The exact algorithms and syntax they use to + generate cookies do not affect interoperability and hence are not + specified here. The following is an example of how an endpoint could + use cookies to implement limited DOS protection. + + A good way to do this is to set the responder cookie to be: + + Cookie = <VersionIDofSecret> | Hash(Ni | IPi | SPIi | <secret>) + + where <secret> is a randomly generated secret known only to the + responder and periodically changed and | indicates concatenation. + <VersionIDofSecret> should be changed whenever <secret> is + regenerated. The cookie can be recomputed when the IKE_SA_INIT + arrives the second time and compared to the cookie in the received + message. If it matches, the responder knows that the cookie was + generated since the last change to <secret> and that IPi must be the + same as the source address it saw the first time. Incorporating SPIi + + + +Kaufman, et al. Expires August 27, 2006 [Page 26] + +Internet-Draft IKEv2bis February 2006 + + + into the calculation ensures that if multiple IKE_SAs are being set + up in parallel they will all get different cookies (assuming the + initiator chooses unique SPIi's). Incorporating Ni into the hash + ensures that an attacker who sees only message 2 can't successfully + forge a message 3. + + If a new value for <secret> is chosen while there are connections in + the process of being initialized, an IKE_SA_INIT might be returned + with other than the current <VersionIDofSecret>. The responder in + that case MAY reject the message by sending another response with a + new cookie or it MAY keep the old value of <secret> around for a + short time and accept cookies computed from either one. {{ Demoted + the SHOULD NOT }} The responder should not accept cookies + indefinitely after <secret> is changed, since that would defeat part + of the denial of service protection. {{ Demoted the SHOULD }} The + responder should change the value of <secret> frequently, especially + if under attack. + + {{ Clarif-2.1 }} In addition to cookies, there are several cases + where the IKE_SA_INIT exchange does not result in the creation of an + IKE_SA (such as INVALID_KE_PAYLOAD or NO_PROPOSAL_CHOSEN). In such a + case, sending a zero value for the Responder's SPI is correct. If + the responder sends a non-zero responder SPI, the initiator should + not reject the response for only that reason. + + {{ Clarif-2.5 }} When one party receives an IKE_SA_INIT request + containing a cookie whose contents do not match the value expected, + that party MUST ignore the cookie and process the message as if no + cookie had been included; usually this means sending a response + containing a new cookie. + +2.6.1. Interaction of COOKIE and INVALID_KE_PAYLOAD + + {{ This section added by Clarif-2.4 }} + + There are two common reasons why the initiator may have to retry the + IKE_SA_INIT exchange: the responder requests a cookie or wants a + different Diffie-Hellman group than was included in the KEi payload. + If the initiator receives a cookie from the responder, the initiator + needs to decide whether or not to include the cookie in only the next + retry of the IKE_SA_INIT request, or in all subsequent retries as + well. + + If the initiator includes the cookie only in the next retry, one + additional roundtrip may be needed in some cases. An additional + roundtrip is needed also if the initiator includes the cookie in all + retries, but the responder does not support this. For instance, if + the responder includes the SAi1 and KEi payloads in cookie + + + +Kaufman, et al. Expires August 27, 2006 [Page 27] + +Internet-Draft IKEv2bis February 2006 + + + calculation, it will reject the request by sending a new cookie. + + If both peers support including the cookie in all retries, a slightly + shorter exchange can happen. Implementations SHOULD support this + shorter exchange, but MUST NOT fail if other implementations do not + support this shorter exchange. + +2.7. Cryptographic Algorithm Negotiation + + The payload type known as "SA" indicates a proposal for a set of + choices of IPsec protocols (IKE, ESP, and/or AH) for the SA as well + as cryptographic algorithms associated with each protocol. + + An SA payload consists of one or more proposals. Each proposal + includes one or more protocols (usually one). Each protocol contains + one or more transforms -- each specifying a cryptographic algorithm. + Each transform contains zero or more attributes (attributes are + needed only if the transform identifier does not completely specify + the cryptographic algorithm). + + This hierarchical structure was designed to efficiently encode + proposals for cryptographic suites when the number of supported + suites is large because multiple values are acceptable for multiple + transforms. The responder MUST choose a single suite, which MAY be + any subset of the SA proposal following the rules below: + + Each proposal contains one or more protocols. If a proposal is + accepted, the SA response MUST contain the same protocols in the same + order as the proposal. The responder MUST accept a single proposal + or reject them all and return an error. (Example: if a single + proposal contains ESP and AH and that proposal is accepted, both ESP + and AH MUST be accepted. If ESP and AH are included in separate + proposals, the responder MUST accept only one of them). + + Each IPsec protocol proposal contains one or more transforms. Each + transform contains a transform type. The accepted cryptographic + suite MUST contain exactly one transform of each type included in the + proposal. For example: if an ESP proposal includes transforms + ENCR_3DES, ENCR_AES w/keysize 128, ENCR_AES w/keysize 256, + AUTH_HMAC_MD5, and AUTH_HMAC_SHA, the accepted suite MUST contain one + of the ENCR_ transforms and one of the AUTH_ transforms. Thus, six + combinations are acceptable. + + Since the initiator sends its Diffie-Hellman value in the + IKE_SA_INIT, it must guess the Diffie-Hellman group that the + responder will select from its list of supported groups. If the + initiator guesses wrong, the responder will respond with a Notify + payload of type INVALID_KE_PAYLOAD indicating the selected group. In + + + +Kaufman, et al. Expires August 27, 2006 [Page 28] + +Internet-Draft IKEv2bis February 2006 + + + this case, the initiator MUST retry the IKE_SA_INIT with the + corrected Diffie-Hellman group. The initiator MUST again propose its + full set of acceptable cryptographic suites because the rejection + message was unauthenticated and otherwise an active attacker could + trick the endpoints into negotiating a weaker suite than a stronger + one that they both prefer. + +2.8. Rekeying + + {{ Demoted the SHOULD }} IKE, ESP, and AH security associations use + secret keys that should be used only for a limited amount of time and + to protect a limited amount of data. This limits the lifetime of the + entire security association. When the lifetime of a security + association expires, the security association MUST NOT be used. If + there is demand, new security associations MAY be established. + Reestablishment of security associations to take the place of ones + that expire is referred to as "rekeying". + + To allow for minimal IPsec implementations, the ability to rekey SAs + without restarting the entire IKE_SA is optional. An implementation + MAY refuse all CREATE_CHILD_SA requests within an IKE_SA. If an SA + has expired or is about to expire and rekeying attempts using the + mechanisms described here fail, an implementation MUST close the + IKE_SA and any associated CHILD_SAs and then MAY start new ones. {{ + Demoted the SHOULD }} Implementations may wish to support in-place + rekeying of SAs, since doing so offers better performance and is + likely to reduce the number of packets lost during the transition. + + To rekey a CHILD_SA within an existing IKE_SA, create a new, + equivalent SA (see Section 2.17 below), and when the new one is + established, delete the old one. To rekey an IKE_SA, establish a new + equivalent IKE_SA (see Section 2.18 below) with the peer to whom the + old IKE_SA is shared using a CREATE_CHILD_SA within the existing + IKE_SA. An IKE_SA so created inherits all of the original IKE_SA's + CHILD_SAs. Use the new IKE_SA for all control messages needed to + maintain the CHILD_SAs created by the old IKE_SA, and delete the old + IKE_SA. The Delete payload to delete itself MUST be the last request + sent over an IKE_SA. + + {{ Demoted the SHOULD }} SAs should be rekeyed proactively, i.e., the + new SA should be established before the old one expires and becomes + unusable. Enough time should elapse between the time the new SA is + established and the old one becomes unusable so that traffic can be + switched over to the new SA. + + A difference between IKEv1 and IKEv2 is that in IKEv1 SA lifetimes + were negotiated. In IKEv2, each end of the SA is responsible for + enforcing its own lifetime policy on the SA and rekeying the SA when + + + +Kaufman, et al. Expires August 27, 2006 [Page 29] + +Internet-Draft IKEv2bis February 2006 + + + necessary. If the two ends have different lifetime policies, the end + with the shorter lifetime will end up always being the one to request + the rekeying. If an SA bundle has been inactive for a long time and + if an endpoint would not initiate the SA in the absence of traffic, + the endpoint MAY choose to close the SA instead of rekeying it when + its lifetime expires. {{ Demoted the SHOULD }} It should do so if + there has been no traffic since the last time the SA was rekeyed. + + Note that IKEv2 deliberately allows parallel SAs with the same + traffic selectors between common endpoints. One of the purposes of + this is to support traffic quality of service (QoS) differences among + the SAs (see [DIFFSERVFIELD], [DIFFSERVARCH], and section 4.1 of + [DIFFTUNNEL]). Hence unlike IKEv1, the combination of the endpoints + and the traffic selectors may not uniquely identify an SA between + those endpoints, so the IKEv1 rekeying heuristic of deleting SAs on + the basis of duplicate traffic selectors SHOULD NOT be used. + + {{ Demoted the SHOULD }} The node that initiated the surviving + rekeyed SA should delete the replaced SA after the new one is + established. + + There are timing windows -- particularly in the presence of lost + packets -- where endpoints may not agree on the state of an SA. The + responder to a CREATE_CHILD_SA MUST be prepared to accept messages on + an SA before sending its response to the creation request, so there + is no ambiguity for the initiator. The initiator MAY begin sending + on an SA as soon as it processes the response. The initiator, + however, cannot receive on a newly created SA until it receives and + processes the response to its CREATE_CHILD_SA request. How, then, is + the responder to know when it is OK to send on the newly created SA? + + From a technical correctness and interoperability perspective, the + responder MAY begin sending on an SA as soon as it sends its response + to the CREATE_CHILD_SA request. In some situations, however, this + could result in packets unnecessarily being dropped, so an + implementation MAY want to defer such sending. + + The responder can be assured that the initiator is prepared to + receive messages on an SA if either (1) it has received a + cryptographically valid message on the new SA, or (2) the new SA + rekeys an existing SA and it receives an IKE request to close the + replaced SA. When rekeying an SA, the responder continues to send + traffic on the old SA until one of those events occurs. When + establishing a new SA, the responder MAY defer sending messages on a + new SA until either it receives one or a timeout has occurred. {{ + Demoted the SHOULD }} If an initiator receives a message on an SA for + which it has not received a response to its CREATE_CHILD_SA request, + it interprets that as a likely packet loss and retransmits the + + + +Kaufman, et al. Expires August 27, 2006 [Page 30] + +Internet-Draft IKEv2bis February 2006 + + + CREATE_CHILD_SA request. An initiator MAY send a dummy message on a + newly created SA if it has no messages queued in order to assure the + responder that the initiator is ready to receive messages. + + {{ Clarif-5.9 }} Throughout this document, "initiator" refers to the + party who initiated the exchange being described, and "original + initiator" refers to the party who initiated the whole IKE_SA. The + "original initiator" always refers to the party who initiated the + exchange which resulted in the current IKE_SA. In other words, if + the the "original responder" starts rekeying the IKE_SA, that party + becomes the "original initiator" of the new IKE_SA. + +2.8.1. Simultaneous CHILD_SA rekeying + + {{ The first two paragraphs were moved, and the rest was added, based + on Clarif-5.11 }} + + If the two ends have the same lifetime policies, it is possible that + both will initiate a rekeying at the same time (which will result in + redundant SAs). To reduce the probability of this happening, the + timing of rekeying requests SHOULD be jittered (delayed by a random + amount of time after the need for rekeying is noticed). + + This form of rekeying may temporarily result in multiple similar SAs + between the same pairs of nodes. When there are two SAs eligible to + receive packets, a node MUST accept incoming packets through either + SA. If redundant SAs are created though such a collision, the SA + created with the lowest of the four nonces used in the two exchanges + SHOULD be closed by the endpoint that created it. {{ Clarif-5.10 }} + "Lowest" means an octet-by-octet, lexicographical comparison (instead + of, for instance, comparing the nonces as large integers). In other + words, start by comparing the first octet; if they're equal, move to + the next octet, and so on. If you reach the end of one nonce, that + nonce is the lower one. + + The following is an explanation on the impact this has on + implementations. Assume that hosts A and B have an existing IPsec SA + pair with SPIs (SPIa1,SPIb1), and both start rekeying it at the same + time: + + Host A Host B + ------------------------------------------------------------------- + send req1: N(REKEY_SA,SPIa1), + SA(..,SPIa2,..),Ni1,.. --> + <-- send req2: N(REKEY_SA,SPIb1), + SA(..,SPIb2,..),Ni2 + recv req2 <-- + + + + +Kaufman, et al. Expires August 27, 2006 [Page 31] + +Internet-Draft IKEv2bis February 2006 + + + At this point, A knows there is a simultaneous rekeying going on. + However, it cannot yet know which of the exchanges will have the + lowest nonce, so it will just note the situation and respond as + usual. + + send resp2: SA(..,SPIa3,..), + Nr1,.. --> + --> recv req1 + + Now B also knows that simultaneous rekeying is going on. It responds + as usual. + + <-- send resp1: SA(..,SPIb3,..), + Nr2,.. + recv resp1 <-- + --> recv resp2 + + At this point, there are three CHILD_SA pairs between A and B (the + old one and two new ones). A and B can now compare the nonces. + Suppose that the lowest nonce was Nr1 in message resp2; in this case, + B (the sender of req2) deletes the redundant new SA, and A (the node + that initiated the surviving rekeyed SA), deletes the old one. + + send req3: D(SPIa1) --> + <-- send req4: D(SPIb2) + --> recv req3 + <-- send resp4: D(SPIb1) + recv req4 <-- + send resp4: D(SPIa3) --> + + The rekeying is now finished. + + However, there is a second possible sequence of events that can + happen if some packets are lost in the network, resulting in + retransmissions. The rekeying begins as usual, but A's first packet + (req1) is lost. + + + + + + + + + + + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 32] + +Internet-Draft IKEv2bis February 2006 + + + Host A Host B + ------------------------------------------------------------------- + send req1: N(REKEY_SA,SPIa1), + SA(..,SPIa2,..), + Ni1,.. --> (lost) + <-- send req2: N(REKEY_SA,SPIb1), + SA(..,SPIb2,..),Ni2 + recv req2 <-- + send resp2: SA(..,SPIa3,..), + Nr1,.. --> + --> recv resp2 + <-- send req3: D(SPIb1) + recv req3 <-- + send resp3: D(SPIa1) --> + --> recv resp3 + + From B's point of view, the rekeying is now completed, and since it + has not yet received A's req1, it does not even know that there was + simultaneous rekeying. However, A will continue retransmitting the + message, and eventually it will reach B. + + resend req1 --> + --> recv req1 + + To B, it looks like A is trying to rekey an SA that no longer exists; + thus, B responds to the request with something non-fatal such as + NO_PROPOSAL_CHOSEN. + + <-- send resp1: N(NO_PROPOSAL_CHOSEN) + recv resp1 <-- + + When A receives this error, it already knows there was simultaneous + rekeying, so it can ignore the error message. + +2.8.2. Rekeying the IKE_SA Versus Reauthentication + + {{ Added this section from Clarif-5.2 }} + + Rekeying the IKE_SA and reauthentication are different concepts in + IKEv2. Rekeying the IKE_SA establishes new keys for the IKE_SA and + resets the Message ID counters, but it does not authenticate the + parties again (no AUTH or EAP payloads are involved). + + Although rekeying the IKE_SA may be important in some environments, + reauthentication (the verification that the parties still have access + to the long-term credentials) is often more important. + + IKEv2 does not have any special support for reauthentication. + + + +Kaufman, et al. Expires August 27, 2006 [Page 33] + +Internet-Draft IKEv2bis February 2006 + + + Reauthentication is done by creating a new IKE_SA from scratch (using + IKE_SA_INIT/IKE_AUTH exchanges, without any REKEY_SA notify + payloads), creating new CHILD_SAs within the new IKE_SA (without + REKEY_SA notify payloads), and finally deleting the old IKE_SA (which + deletes the old CHILD_SAs as well). + + This means that reauthentication also establishes new keys for the + IKE_SA and CHILD_SAs. Therefore, while rekeying can be performed + more often than reauthentication, the situation where "authentication + lifetime" is shorter than "key lifetime" does not make sense. + + While creation of a new IKE_SA can be initiated by either party + (initiator or responder in the original IKE_SA), the use of EAP + authentication and/or configuration payloads means in practice that + reauthentication has to be initiated by the same party as the + original IKE_SA. IKEv2 does not currently allow the responder to + request reauthentication in this case; however, there is ongoing work + to add this functionality [REAUTH]. + +2.9. Traffic Selector Negotiation + + {{ Clarif-7.2 }} When an RFC4301-compliant IPsec subsystem receives + an IP packet and matches a "protect" selector in its Security Policy + Database (SPD), the subsystem protects that packet with IPsec. When + no SA exists yet, it is the task of IKE to create it. Maintenance of + a system's SPD is outside the scope of IKE (see [PFKEY] for an + example protocol), though some implementations might update their SPD + in connection with the running of IKE (for an example scenario, see + Section 1.1.3). + + Traffic Selector (TS) payloads allow endpoints to communicate some of + the information from their SPD to their peers. TS payloads specify + the selection criteria for packets that will be forwarded over the + newly set up SA. This can serve as a consistency check in some + scenarios to assure that the SPDs are consistent. In others, it + guides the dynamic update of the SPD. + + Two TS payloads appear in each of the messages in the exchange that + creates a CHILD_SA pair. Each TS payload contains one or more + Traffic Selectors. Each Traffic Selector consists of an address + range (IPv4 or IPv6), a port range, and an IP protocol ID. In + support of the scenario described in Section 1.1.3, an initiator may + request that the responder assign an IP address and tell the + initiator what it is. {{ Clarif-6.1 }} That request is done using + configuration payloads, not traffic selectors. An address in a TSi + payload in a response does not mean that the responder has assigned + that address to the initiator: it only means that if packets matching + these traffic selectors are sent by the initiator, IPsec processing + + + +Kaufman, et al. Expires August 27, 2006 [Page 34] + +Internet-Draft IKEv2bis February 2006 + + + can be performed as agreed for this SA. + + IKEv2 allows the responder to choose a subset of the traffic proposed + by the initiator. This could happen when the configurations of the + two endpoints are being updated but only one end has received the new + information. Since the two endpoints may be configured by different + people, the incompatibility may persist for an extended period even + in the absence of errors. It also allows for intentionally different + configurations, as when one end is configured to tunnel all addresses + and depends on the other end to have the up-to-date list. + + The first of the two TS payloads is known as TSi (Traffic Selector- + initiator). The second is known as TSr (Traffic Selector-responder). + TSi specifies the source address of traffic forwarded from (or the + destination address of traffic forwarded to) the initiator of the + CHILD_SA pair. TSr specifies the destination address of the traffic + forwarded to (or the source address of the traffic forwarded from) + the responder of the CHILD_SA pair. For example, if the original + initiator request the creation of a CHILD_SA pair, and wishes to + tunnel all traffic from subnet 192.0.1.* on the initiator's side to + subnet 192.0.2.* on the responder's side, the initiator would include + a single traffic selector in each TS payload. TSi would specify the + address range (192.0.1.0 - 192.0.1.255) and TSr would specify the + address range (192.0.2.0 - 192.0.2.255). Assuming that proposal was + acceptable to the responder, it would send identical TS payloads + back. (Note: The IP address range 192.0.2.* has been reserved for + use in examples in RFCs and similar documents. This document needed + two such ranges, and so also used 192.0.1.*. This should not be + confused with any actual address.) + + The responder is allowed to narrow the choices by selecting a subset + of the traffic, for instance by eliminating or narrowing the range of + one or more members of the set of traffic selectors, provided the set + does not become the NULL set. + + It is possible for the responder's policy to contain multiple smaller + ranges, all encompassed by the initiator's traffic selector, and with + the responder's policy being that each of those ranges should be sent + over a different SA. Continuing the example above, the responder + might have a policy of being willing to tunnel those addresses to and + from the initiator, but might require that each address pair be on a + separately negotiated CHILD_SA. If the initiator generated its + request in response to an incoming packet from 192.0.1.43 to + 192.0.2.123, there would be no way for the responder to determine + which pair of addresses should be included in this tunnel, and it + would have to make a guess or reject the request with a status of + SINGLE_PAIR_REQUIRED. + + + + +Kaufman, et al. Expires August 27, 2006 [Page 35] + +Internet-Draft IKEv2bis February 2006 + + + {{ Clarif-4.11 }} Few implementations will have policies that require + separate SAs for each address pair. Because of this, if only some + part (or parts) of the TSi/TSr proposed by the initiator is (are) + acceptable to the responder, responders SHOULD narrow TSi/TSr to an + acceptable subset rather than use SINGLE_PAIR_REQUIRED. + + To enable the responder to choose the appropriate range in this case, + if the initiator has requested the SA due to a data packet, the + initiator SHOULD include as the first traffic selector in each of TSi + and TSr a very specific traffic selector including the addresses in + the packet triggering the request. In the example, the initiator + would include in TSi two traffic selectors: the first containing the + address range (192.0.1.43 - 192.0.1.43) and the source port and IP + protocol from the packet and the second containing (192.0.1.0 - + 192.0.1.255) with all ports and IP protocols. The initiator would + similarly include two traffic selectors in TSr. + + If the responder's policy does not allow it to accept the entire set + of traffic selectors in the initiator's request, but does allow him + to accept the first selector of TSi and TSr, then the responder MUST + narrow the traffic selectors to a subset that includes the + initiator's first choices. In this example, the responder might + respond with TSi being (192.0.1.43 - 192.0.1.43) with all ports and + IP protocols. + + If the initiator creates the CHILD_SA pair not in response to an + arriving packet, but rather, say, upon startup, then there may be no + specific addresses the initiator prefers for the initial tunnel over + any other. In that case, the first values in TSi and TSr MAY be + ranges rather than specific values, and the responder chooses a + subset of the initiator's TSi and TSr that are acceptable. If more + than one subset is acceptable but their union is not, the responder + MUST accept some subset and MAY include a Notify payload of type + ADDITIONAL_TS_POSSIBLE to indicate that the initiator might want to + try again. This case will occur only when the initiator and + responder are configured differently from one another. If the + initiator and responder agree on the granularity of tunnels, the + initiator will never request a tunnel wider than the responder will + accept. {{ Demoted the SHOULD }} Such misconfigurations should be + recorded in error logs. + + {{ Clarif-4.10 }} A concise summary of the narrowing process is: + + o If the responder's policy does not allow any part of the traffic + covered by TSi/TSr, it responds with TS_UNACCEPTABLE. + + o If the responder's policy allows the entire set of traffic covered + by TSi/TSr, no narrowing is necessary, and the responder can + + + +Kaufman, et al. Expires August 27, 2006 [Page 36] + +Internet-Draft IKEv2bis February 2006 + + + return the same TSi/TSr values. + + o Otherwise, narrowing is needed. If the responder's policy allows + all traffic covered by TSi[1]/TSr[1] (the first traffic selectors + in TSi/TSr) but not entire TSi/TSr, the responder narrows to an + acceptable subset of TSi/TSr that includes TSi[1]/TSr[1]. + + o If the responder's policy does not allow all traffic covered by + TSi[1]/TSr[1], but does allow some parts of TSi/TSr, it narrows to + an acceptable subset of TSi/TSr. + + In the last two cases, there may be several subsets that are + acceptable (but their union is not); in this case, the responder + arbitrarily chooses one of them, and includes ADDITIONAL_TS_POSSIBLE + notification in the response. + +2.9.1. Traffic Selectors Violating Own Policy + + {{ Clarif-4.12 }} + + When creating a new SA, the initiator needs to avoid proposing + traffic selectors that violate its own policy. If this rule is not + followed, valid traffic may be dropped. + + This is best illustrated by an example. Suppose that host A has a + policy whose effect is that traffic to 192.0.1.66 is sent via host B + encrypted using AES, and traffic to all other hosts in 192.0.1.0/24 + is also sent via B, but must use 3DES. Suppose also that host B + accepts any combination of AES and 3DES. + + If host A now proposes an SA that uses 3DES, and includes TSr + containing (192.0.1.0-192.0.1.0.255), this will be accepted by host + B. Now, host B can also use this SA to send traffic from 192.0.1.66, + but those packets will be dropped by A since it requires the use of + AES for those traffic. Even if host A creates a new SA only for + 192.0.1.66 that uses AES, host B may freely continue to use the first + SA for the traffic. In this situation, when proposing the SA, host A + should have followed its own policy, and included a TSr containing + ((192.0.1.0-192.0.1.65),(192.0.1.67-192.0.1.255)) instead. + + In general, if (1) the initiator makes a proposal "for traffic X + (TSi/TSr), do SA", and (2) for some subset X' of X, the initiator + does not actually accept traffic X' with SA, and (3) the initiator + would be willing to accept traffic X' with some SA' (!=SA), valid + traffic can be unnecessarily dropped since the responder can apply + either SA or SA' to traffic X'. + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 37] + +Internet-Draft IKEv2bis February 2006 + + +2.10. Nonces + + The IKE_SA_INIT messages each contain a nonce. These nonces are used + as inputs to cryptographic functions. The CREATE_CHILD_SA request + and the CREATE_CHILD_SA response also contain nonces. These nonces + are used to add freshness to the key derivation technique used to + obtain keys for CHILD_SA, and to ensure creation of strong pseudo- + random bits from the Diffie-Hellman key. Nonces used in IKEv2 MUST + be randomly chosen, MUST be at least 128 bits in size, and MUST be at + least half the key size of the negotiated prf. ("prf" refers to + "pseudo-random function", one of the cryptographic algorithms + negotiated in the IKE exchange.) {{ Clarif-7.4 }} However, the + initiator chooses the nonce before the outcome of the negotiation is + known. Because of that, the nonce has to be long enough for all the + PRFs being proposed. If the same random number source is used for + both keys and nonces, care must be taken to ensure that the latter + use does not compromise the former. + +2.11. Address and Port Agility + + IKE runs over UDP ports 500 and 4500, and implicitly sets up ESP and + AH associations for the same IP addresses it runs over. The IP + addresses and ports in the outer header are, however, not themselves + cryptographically protected, and IKE is designed to work even through + Network Address Translation (NAT) boxes. An implementation MUST + accept incoming requests even if the source port is not 500 or 4500, + and MUST respond to the address and port from which the request was + received. It MUST specify the address and port at which the request + was received as the source address and port in the response. IKE + functions identically over IPv4 or IPv6. + +2.12. Reuse of Diffie-Hellman Exponentials + + IKE generates keying material using an ephemeral Diffie-Hellman + exchange in order to gain the property of "perfect forward secrecy". + This means that once a connection is closed and its corresponding + keys are forgotten, even someone who has recorded all of the data + from the connection and gets access to all of the long-term keys of + the two endpoints cannot reconstruct the keys used to protect the + conversation without doing a brute force search of the session key + space. + + Achieving perfect forward secrecy requires that when a connection is + closed, each endpoint MUST forget not only the keys used by the + connection but also any information that could be used to recompute + those keys. In particular, it MUST forget the secrets used in the + Diffie-Hellman calculation and any state that may persist in the + state of a pseudo-random number generator that could be used to + + + +Kaufman, et al. Expires August 27, 2006 [Page 38] + +Internet-Draft IKEv2bis February 2006 + + + recompute the Diffie-Hellman secrets. + + Since the computing of Diffie-Hellman exponentials is computationally + expensive, an endpoint may find it advantageous to reuse those + exponentials for multiple connection setups. There are several + reasonable strategies for doing this. An endpoint could choose a new + exponential only periodically though this could result in less-than- + perfect forward secrecy if some connection lasts for less than the + lifetime of the exponential. Or it could keep track of which + exponential was used for each connection and delete the information + associated with the exponential only when some corresponding + connection was closed. This would allow the exponential to be reused + without losing perfect forward secrecy at the cost of maintaining + more state. + + Decisions as to whether and when to reuse Diffie-Hellman exponentials + is a private decision in the sense that it will not affect + interoperability. An implementation that reuses exponentials MAY + choose to remember the exponential used by the other endpoint on past + exchanges and if one is reused to avoid the second half of the + calculation. + +2.13. Generating Keying Material + + In the context of the IKE_SA, four cryptographic algorithms are + negotiated: an encryption algorithm, an integrity protection + algorithm, a Diffie-Hellman group, and a pseudo-random function + (prf). The pseudo-random function is used for the construction of + keying material for all of the cryptographic algorithms used in both + the IKE_SA and the CHILD_SAs. + + We assume that each encryption algorithm and integrity protection + algorithm uses a fixed-size key and that any randomly chosen value of + that fixed size can serve as an appropriate key. For algorithms that + accept a variable length key, a fixed key size MUST be specified as + part of the cryptographic transform negotiated. For algorithms for + which not all values are valid keys (such as DES or 3DES with key + parity), the algorithm by which keys are derived from arbitrary + values MUST be specified by the cryptographic transform. For + integrity protection functions based on Hashed Message Authentication + Code (HMAC), the fixed key size is the size of the output of the + underlying hash function. When the prf function takes a variable + length key, variable length data, and produces a fixed-length output + (e.g., when using HMAC), the formulas in this document apply. When + the key for the prf function has fixed length, the data provided as a + key is truncated or padded with zeros as necessary unless exceptional + processing is explained following the formula. + + + + +Kaufman, et al. Expires August 27, 2006 [Page 39] + +Internet-Draft IKEv2bis February 2006 + + + Keying material will always be derived as the output of the + negotiated prf algorithm. Since the amount of keying material needed + may be greater than the size of the output of the prf algorithm, we + will use the prf iteratively. We will use the terminology prf+ to + describe the function that outputs a pseudo-random stream based on + the inputs to a prf as follows: (where | indicates concatenation) + + prf+ (K,S) = T1 | T2 | T3 | T4 | ... + + where: + T1 = prf (K, S | 0x01) + T2 = prf (K, T1 | S | 0x02) + T3 = prf (K, T2 | S | 0x03) + T4 = prf (K, T3 | S | 0x04) + + continuing as needed to compute all required keys. The keys are + taken from the output string without regard to boundaries (e.g., if + the required keys are a 256-bit Advanced Encryption Standard (AES) + key and a 160-bit HMAC key, and the prf function generates 160 bits, + the AES key will come from T1 and the beginning of T2, while the HMAC + key will come from the rest of T2 and the beginning of T3). + + The constant concatenated to the end of each string feeding the prf + is a single octet. prf+ in this document is not defined beyond 255 + times the size of the prf output. + +2.14. Generating Keying Material for the IKE_SA + + The shared keys are computed as follows. A quantity called SKEYSEED + is calculated from the nonces exchanged during the IKE_SA_INIT + exchange and the Diffie-Hellman shared secret established during that + exchange. SKEYSEED is used to calculate seven other secrets: SK_d + used for deriving new keys for the CHILD_SAs established with this + IKE_SA; SK_ai and SK_ar used as a key to the integrity protection + algorithm for authenticating the component messages of subsequent + exchanges; SK_ei and SK_er used for encrypting (and of course + decrypting) all subsequent exchanges; and SK_pi and SK_pr, which are + used when generating an AUTH payload. + + SKEYSEED and its derivatives are computed as follows: + + SKEYSEED = prf(Ni | Nr, g^ir) + + {SK_d | SK_ai | SK_ar | SK_ei | SK_er | SK_pi | SK_pr } + = prf+ (SKEYSEED, Ni | Nr | SPIi | SPIr ) + + (indicating that the quantities SK_d, SK_ai, SK_ar, SK_ei, SK_er, + SK_pi, and SK_pr are taken in order from the generated bits of the + + + +Kaufman, et al. Expires August 27, 2006 [Page 40] + +Internet-Draft IKEv2bis February 2006 + + + prf+). g^ir is the shared secret from the ephemeral Diffie-Hellman + exchange. g^ir is represented as a string of octets in big endian + order padded with zeros if necessary to make it the length of the + modulus. Ni and Nr are the nonces, stripped of any headers. If the + negotiated prf takes a fixed-length key and the lengths of Ni and Nr + do not add up to that length, half the bits must come from Ni and + half from Nr, taking the first bits of each. + + The two directions of traffic flow use different keys. The keys used + to protect messages from the original initiator are SK_ai and SK_ei. + The keys used to protect messages in the other direction are SK_ar + and SK_er. Each algorithm takes a fixed number of bits of keying + material, which is specified as part of the algorithm. For integrity + algorithms based on a keyed hash, the key size is always equal to the + length of the output of the underlying hash function. + +2.15. Authentication of the IKE_SA + + When not using extensible authentication (see Section 2.16), the + peers are authenticated by having each sign (or MAC using a shared + secret as the key) a block of data. For the responder, the octets to + be signed start with the first octet of the first SPI in the header + of the second message and end with the last octet of the last payload + in the second message. Appended to this (for purposes of computing + the signature) are the initiator's nonce Ni (just the value, not the + payload containing it), and the value prf(SK_pr,IDr') where IDr' is + the responder's ID payload excluding the fixed header. Note that + neither the nonce Ni nor the value prf(SK_pr,IDr') are transmitted. + Similarly, the initiator signs the first message, starting with the + first octet of the first SPI in the header and ending with the last + octet of the last payload. Appended to this (for purposes of + computing the signature) are the responder's nonce Nr, and the value + prf(SK_pi,IDi'). In the above calculation, IDi' and IDr' are the + entire ID payloads excluding the fixed header. It is critical to the + security of the exchange that each side sign the other side's nonce. + + {{ Clarif-3.1 }} + + The initiator's signed octets can be described as: + + InitiatorSignedOctets = RealMessage1 | NonceRData | MACedIDForI + GenIKEHDR = [ four octets 0 if using port 4500 ] | RealIKEHDR + RealIKEHDR = SPIi | SPIr | . . . | Length + RealMessage1 = RealIKEHDR | RestOfMessage1 + NonceRPayload = PayloadHeader | NonceRData + InitiatorIDPayload = PayloadHeader | RestOfIDPayload + RestOfInitIDPayload = IDType | RESERVED | InitIDData + MACedIDForI = prf(SK_pi, RestOfInitIDPayload) + + + +Kaufman, et al. Expires August 27, 2006 [Page 41] + +Internet-Draft IKEv2bis February 2006 + + + The responder's signed octets can be described as: + + ResponderSignedOctets = RealMessage2 | NonceIData | MACedIDForR + GenIKEHDR = [ four octets 0 if using port 4500 ] | RealIKEHDR + RealIKEHDR = SPIi | SPIr | . . . | Length + RealMessage2 = RealIKEHDR | RestOfMessage2 + NonceIPayload = PayloadHeader | NonceIData + ResponderIDPayload = PayloadHeader | RestOfIDPayload + RestOfRespIDPayload = IDType | RESERVED | InitIDData + MACedIDForR = prf(SK_pr, RestOfRespIDPayload) + + Note that all of the payloads are included under the signature, + including any payload types not defined in this document. If the + first message of the exchange is sent twice (the second time with a + responder cookie and/or a different Diffie-Hellman group), it is the + second version of the message that is signed. + + Optionally, messages 3 and 4 MAY include a certificate, or + certificate chain providing evidence that the key used to compute a + digital signature belongs to the name in the ID payload. The + signature or MAC will be computed using algorithms dictated by the + type of key used by the signer, and specified by the Auth Method + field in the Authentication payload. There is no requirement that + the initiator and responder sign with the same cryptographic + algorithms. The choice of cryptographic algorithms depends on the + type of key each has. In particular, the initiator may be using a + shared key while the responder may have a public signature key and + certificate. It will commonly be the case (but it is not required) + that if a shared secret is used for authentication that the same key + is used in both directions. Note that it is a common but typically + insecure practice to have a shared key derived solely from a user- + chosen password without incorporating another source of randomness. + + This is typically insecure because user-chosen passwords are unlikely + to have sufficient unpredictability to resist dictionary attacks and + these attacks are not prevented in this authentication method. + (Applications using password-based authentication for bootstrapping + and IKE_SA should use the authentication method in Section 2.16, + which is designed to prevent off-line dictionary attacks.) {{ Demoted + the SHOULD }} The pre-shared key needs to contain as much + unpredictability as the strongest key being negotiated. In the case + of a pre-shared key, the AUTH value is computed as: + + AUTH = prf(prf(Shared Secret,"Key Pad for IKEv2"), <msg octets>) + + where the string "Key Pad for IKEv2" is 17 ASCII characters without + null termination. The shared secret can be variable length. The pad + string is added so that if the shared secret is derived from a + + + +Kaufman, et al. Expires August 27, 2006 [Page 42] + +Internet-Draft IKEv2bis February 2006 + + + password, the IKE implementation need not store the password in + cleartext, but rather can store the value prf(Shared Secret,"Key Pad + for IKEv2"), which could not be used as a password equivalent for + protocols other than IKEv2. As noted above, deriving the shared + secret from a password is not secure. This construction is used + because it is anticipated that people will do it anyway. The + management interface by which the Shared Secret is provided MUST + accept ASCII strings of at least 64 octets and MUST NOT add a null + terminator before using them as shared secrets. It MUST also accept + a hex encoding of the Shared Secret. The management interface MAY + accept other encodings if the algorithm for translating the encoding + to a binary string is specified. + + {{ Clarif-3.7 }} If the negotiated prf takes a fixed-size key, the + shared secret MUST be of that fixed size. This requirement means + that it is difficult to use these PRFs with shared key authentication + because it limits the shared secrets that can be used. Thus, PRFs + that require a fixed-size key SHOULD NOT be used with shared key + authentication. For example, PRF_AES128_CBC [PRFAES128CBC] + originally used fixed key sizes; that RFC has been updated to handle + variable key sizes in [PRFAES128CBC-bis]. Note that Section 2.13 + also contains text that is related to PRFs with fixed key size. + However, the text in that section applies only to the prf+ + construction. + +2.16. Extensible Authentication Protocol Methods + + In addition to authentication using public key signatures and shared + secrets, IKE supports authentication using methods defined in RFC + 3748 [EAP]. Typically, these methods are asymmetric (designed for a + user authenticating to a server), and they may not be mutual. {{ In + the next sentence, changed "public key signature based" to "strong" + }} For this reason, these protocols are typically used to + authenticate the initiator to the responder and MUST be used in + conjunction with a strong authentication of the responder to the + initiator. These methods are often associated with mechanisms + referred to as "Legacy Authentication" mechanisms. + + While this memo references [EAP] with the intent that new methods can + be added in the future without updating this specification, some + simpler variations are documented here and in Section 3.16. [EAP] + defines an authentication protocol requiring a variable number of + messages. Extensible Authentication is implemented in IKE as + additional IKE_AUTH exchanges that MUST be completed in order to + initialize the IKE_SA. + + An initiator indicates a desire to use extensible authentication by + leaving out the AUTH payload from message 3. By including an IDi + + + +Kaufman, et al. Expires August 27, 2006 [Page 43] + +Internet-Draft IKEv2bis February 2006 + + + payload but not an AUTH payload, the initiator has declared an + identity but has not proven it. If the responder is willing to use + an extensible authentication method, it will place an Extensible + Authentication Protocol (EAP) payload in message 4 and defer sending + SAr2, TSi, and TSr until initiator authentication is complete in a + subsequent IKE_AUTH exchange. In the case of a minimal extensible + authentication, the initial SA establishment will appear as follows: + + Initiator Responder + ------------------------------------------------------------------- + HDR, SAi1, KEi, Ni --> + <-- HDR, SAr1, KEr, Nr, [CERTREQ] + HDR, SK {IDi, [CERTREQ,] + [IDr,] SAi2, + TSi, TSr} --> + <-- HDR, SK {IDr, [CERT,] AUTH, + EAP } + HDR, SK {EAP} --> + <-- HDR, SK {EAP (success)} + HDR, SK {AUTH} --> + <-- HDR, SK {AUTH, SAr2, TSi, TSr } + + {{ Clarif-3.10 }} As described in Section 2.2, when EAP is used, each + pair of IKE_SA initial setup messages will have their message numbers + incremented; the first pair of AUTH messages will have an ID of 1, + the second will be 2, and so on. + + For EAP methods that create a shared key as a side effect of + authentication, that shared key MUST be used by both the initiator + and responder to generate AUTH payloads in messages 7 and 8 using the + syntax for shared secrets specified in Section 2.15. The shared key + from EAP is the field from the EAP specification named MSK. The + shared key generated during an IKE exchange MUST NOT be used for any + other purpose. + + EAP methods that do not establish a shared key SHOULD NOT be used, as + they are subject to a number of man-in-the-middle attacks [EAPMITM] + if these EAP methods are used in other protocols that do not use a + server-authenticated tunnel. Please see the Security Considerations + section for more details. If EAP methods that do not generate a + shared key are used, the AUTH payloads in messages 7 and 8 MUST be + generated using SK_pi and SK_pr, respectively. + + {{ Demoted the SHOULD }} The initiator of an IKE_SA using EAP needs + to be capable of extending the initial protocol exchange to at least + ten IKE_AUTH exchanges in the event the responder sends notification + messages and/or retries the authentication prompt. Once the protocol + exchange defined by the chosen EAP authentication method has + + + +Kaufman, et al. Expires August 27, 2006 [Page 44] + +Internet-Draft IKEv2bis February 2006 + + + successfully terminated, the responder MUST send an EAP payload + containing the Success message. Similarly, if the authentication + method has failed, the responder MUST send an EAP payload containing + the Failure message. The responder MAY at any time terminate the IKE + exchange by sending an EAP payload containing the Failure message. + + Following such an extended exchange, the EAP AUTH payloads MUST be + included in the two messages following the one containing the EAP + Success message. + + {{ Clarif-3.5 }} When the initiator authentication uses EAP, it is + possible that the contents of the IDi payload is used only for AAA + routing purposes and selecting which EAP method to use. This value + may be different from the identity authenticated by the EAP method. + It is important that policy lookups and access control decisions use + the actual authenticated identity. Often the EAP server is + implemented in a separate AAA server that communicates with the IKEv2 + responder. In this case, the authenticated identity has to be sent + from the AAA server to the IKEv2 responder. + + {{ Clarif-3.8 }} The information in Section 2.17 about PRFs with + fixed-size keys also applies to EAP authentication. For instance, a + PRF that requires a 128-bit key cannot be used with EAP because + specifies that the MSK is at least 512 bits long. + +2.17. Generating Keying Material for CHILD_SAs + + A single CHILD_SA is created by the IKE_AUTH exchange, and additional + CHILD_SAs can optionally be created in CREATE_CHILD_SA exchanges. + Keying material for them is generated as follows: + + KEYMAT = prf+(SK_d, Ni | Nr) + + Where Ni and Nr are the nonces from the IKE_SA_INIT exchange if this + request is the first CHILD_SA created or the fresh Ni and Nr from the + CREATE_CHILD_SA exchange if this is a subsequent creation. + + For CREATE_CHILD_SA exchanges including an optional Diffie-Hellman + exchange, the keying material is defined as: + + KEYMAT = prf+(SK_d, g^ir (new) | Ni | Nr ) + + where g^ir (new) is the shared secret from the ephemeral Diffie- + Hellman exchange of this CREATE_CHILD_SA exchange (represented as an + octet string in big endian order padded with zeros in the high-order + bits if necessary to make it the length of the modulus). + + A single CHILD_SA negotiation may result in multiple security + + + +Kaufman, et al. Expires August 27, 2006 [Page 45] + +Internet-Draft IKEv2bis February 2006 + + + associations. ESP and AH SAs exist in pairs (one in each direction), + and four SAs could be created in a single CHILD_SA negotiation if a + combination of ESP and AH is being negotiated. + + Keying material MUST be taken from the expanded KEYMAT in the + following order: + + o All keys for SAs carrying data from the initiator to the responder + are taken before SAs going in the reverse direction. + + o If multiple IPsec protocols are negotiated, keying material is + taken in the order in which the protocol headers will appear in + the encapsulated packet. + + o If a single protocol has both encryption and authentication keys, + the encryption key is taken from the first octets of KEYMAT and + the authentication key is taken from the next octets. + + Each cryptographic algorithm takes a fixed number of bits of keying + material specified as part of the algorithm. + +2.18. Rekeying IKE_SAs Using a CREATE_CHILD_SA Exchange + + The CREATE_CHILD_SA exchange can be used to rekey an existing IKE_SA + (see Section 2.8). {{ Clarif-5.3 }} New initiator and responder SPIs + are supplied in the SPI fields in the Proposal structures inside the + Security Association (SA) payloads (not the SPI fields in the IKE + header). The TS payloads are omitted when rekeying an IKE_SA. + SKEYSEED for the new IKE_SA is computed using SK_d from the existing + IKE_SA as follows: + + SKEYSEED = prf(SK_d (old), [g^ir (new)] | Ni | Nr) + + where g^ir (new) is the shared secret from the ephemeral Diffie- + Hellman exchange of this CREATE_CHILD_SA exchange (represented as an + octet string in big endian order padded with zeros if necessary to + make it the length of the modulus) and Ni and Nr are the two nonces + stripped of any headers. + + {{ Clarif-5.5 }} The old and new IKE_SA may have selected a different + PRF. Because the rekeying exchange belongs to the old IKE_SA, it is + the old IKE_SA's PRF that is used. Note that this may not work if + the new IKE_SA's PRF has a fixed key size because the output of the + PRF may not be of the correct size. + + The new IKE_SA MUST reset its message counters to 0. + + SK_d, SK_ai, SK_ar, SK_ei, and SK_er are computed from SKEYSEED as + + + +Kaufman, et al. Expires August 27, 2006 [Page 46] + +Internet-Draft IKEv2bis February 2006 + + + specified in Section 2.14. + +2.19. Requesting an Internal Address on a Remote Network + + Most commonly occurring in the endpoint-to-security-gateway scenario, + an endpoint may need an IP address in the network protected by the + security gateway and may need to have that address dynamically + assigned. A request for such a temporary address can be included in + any request to create a CHILD_SA (including the implicit request in + message 3) by including a CP payload. + + This function provides address allocation to an IPsec Remote Access + Client (IRAC) trying to tunnel into a network protected by an IPsec + Remote Access Server (IRAS). Since the IKE_AUTH exchange creates an + IKE_SA and a CHILD_SA, the IRAC MUST request the IRAS-controlled + address (and optionally other information concerning the protected + network) in the IKE_AUTH exchange. The IRAS may procure an address + for the IRAC from any number of sources such as a DHCP/BOOTP server + or its own address pool. + + Initiator Responder + ------------------------------------------------------------------- + HDR, SK {IDi, [CERT,] + [CERTREQ,] [IDr,] AUTH, + CP(CFG_REQUEST), SAi2, + TSi, TSr} --> + <-- HDR, SK {IDr, [CERT,] AUTH, + CP(CFG_REPLY), SAr2, + TSi, TSr} + + In all cases, the CP payload MUST be inserted before the SA payload. + In variations of the protocol where there are multiple IKE_AUTH + exchanges, the CP payloads MUST be inserted in the messages + containing the SA payloads. + + CP(CFG_REQUEST) MUST contain at least an INTERNAL_ADDRESS attribute + (either IPv4 or IPv6) but MAY contain any number of additional + attributes the initiator wants returned in the response. + + For example, message from initiator to responder: + + CP(CFG_REQUEST)= + INTERNAL_ADDRESS() + TSi = (0, 0-65535,0.0.0.0-255.255.255.255) + TSr = (0, 0-65535,0.0.0.0-255.255.255.255) + + NOTE: Traffic Selectors contain (protocol, port range, address + range). + + + +Kaufman, et al. Expires August 27, 2006 [Page 47] + +Internet-Draft IKEv2bis February 2006 + + + Message from responder to initiator: + + CP(CFG_REPLY)= + INTERNAL_ADDRESS(192.0.2.202) + INTERNAL_NETMASK(255.255.255.0) + INTERNAL_SUBNET(192.0.2.0/255.255.255.0) + TSi = (0, 0-65535,192.0.2.202-192.0.2.202) + TSr = (0, 0-65535,192.0.2.0-192.0.2.255) + + All returned values will be implementation dependent. As can be seen + in the above example, the IRAS MAY also send other attributes that + were not included in CP(CFG_REQUEST) and MAY ignore the non- + mandatory attributes that it does not support. + + The responder MUST NOT send a CFG_REPLY without having first received + a CP(CFG_REQUEST) from the initiator, because we do not want the IRAS + to perform an unnecessary configuration lookup if the IRAC cannot + process the REPLY. In the case where the IRAS's configuration + requires that CP be used for a given identity IDi, but IRAC has + failed to send a CP(CFG_REQUEST), IRAS MUST fail the request, and + terminate the IKE exchange with a FAILED_CP_REQUIRED error. + +2.20. Requesting the Peer's Version + + An IKE peer wishing to inquire about the other peer's IKE software + version information MAY use the method below. This is an example of + a configuration request within an INFORMATIONAL exchange, after the + IKE_SA and first CHILD_SA have been created. + + An IKE implementation MAY decline to give out version information + prior to authentication or even after authentication to prevent + trolling in case some implementation is known to have some security + weakness. In that case, it MUST either return an empty string or no + CP payload if CP is not supported. + + Initiator Responder + ------------------------------------------------------------------- + HDR, SK{CP(CFG_REQUEST)} --> + <-- HDR, SK{CP(CFG_REPLY)} + + CP(CFG_REQUEST)= + APPLICATION_VERSION("") + + CP(CFG_REPLY) APPLICATION_VERSION("foobar v1.3beta, (c) Foo Bar + Inc.") + + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 48] + +Internet-Draft IKEv2bis February 2006 + + +2.21. Error Handling + + There are many kinds of errors that can occur during IKE processing. + If a request is received that is badly formatted or unacceptable for + reasons of policy (e.g., no matching cryptographic algorithms), the + response MUST contain a Notify payload indicating the error. If an + error occurs outside the context of an IKE request (e.g., the node is + getting ESP messages on a nonexistent SPI), the node SHOULD initiate + an INFORMATIONAL exchange with a Notify payload describing the + problem. + + Errors that occur before a cryptographically protected IKE_SA is + established must be handled very carefully. There is a trade-off + between wanting to be helpful in diagnosing a problem and responding + to it and wanting to avoid being a dupe in a denial of service attack + based on forged messages. + + If a node receives a message on UDP port 500 or 4500 outside the + context of an IKE_SA known to it (and not a request to start one), it + may be the result of a recent crash of the node. If the message is + marked as a response, the node MAY audit the suspicious event but + MUST NOT respond. If the message is marked as a request, the node + MAY audit the suspicious event and MAY send a response. If a + response is sent, the response MUST be sent to the IP address and + port from whence it came with the same IKE SPIs and the Message ID + copied. The response MUST NOT be cryptographically protected and + MUST contain a Notify payload indicating INVALID_IKE_SPI. + + A node receiving such an unprotected Notify payload MUST NOT respond + and MUST NOT change the state of any existing SAs. The message might + be a forgery or might be a response the genuine correspondent was + tricked into sending. {{ Demoted two SHOULDs }} A node should treat + such a message (and also a network message like ICMP destination + unreachable) as a hint that there might be problems with SAs to that + IP address and should initiate a liveness test for any such IKE_SA. + An implementation SHOULD limit the frequency of such tests to avoid + being tricked into participating in a denial of service attack. + + A node receiving a suspicious message from an IP address with which + it has an IKE_SA MAY send an IKE Notify payload in an IKE + INFORMATIONAL exchange over that SA. {{ Demoted the SHOULD }} The + recipient MUST NOT change the state of any SAs as a result, but may + wish to audit the event to aid in diagnosing malfunctions. A node + MUST limit the rate at which it will send messages in response to + unprotected messages. + + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 49] + +Internet-Draft IKEv2bis February 2006 + + +2.22. IPComp + + Use of IP compression [IPCOMP] can be negotiated as part of the setup + of a CHILD_SA. While IP compression involves an extra header in each + packet and a compression parameter index (CPI), the virtual + "compression association" has no life outside the ESP or AH SA that + contains it. Compression associations disappear when the + corresponding ESP or AH SA goes away. It is not explicitly mentioned + in any DELETE payload. + + Negotiation of IP compression is separate from the negotiation of + cryptographic parameters associated with a CHILD_SA. A node + requesting a CHILD_SA MAY advertise its support for one or more + compression algorithms through one or more Notify payloads of type + IPCOMP_SUPPORTED. The response MAY indicate acceptance of a single + compression algorithm with a Notify payload of type IPCOMP_SUPPORTED. + These payloads MUST NOT occur in messages that do not contain SA + payloads. + + Although there has been discussion of allowing multiple compression + algorithms to be accepted and to have different compression + algorithms available for the two directions of a CHILD_SA, + implementations of this specification MUST NOT accept an IPComp + algorithm that was not proposed, MUST NOT accept more than one, and + MUST NOT compress using an algorithm other than one proposed and + accepted in the setup of the CHILD_SA. + + A side effect of separating the negotiation of IPComp from + cryptographic parameters is that it is not possible to propose + multiple cryptographic suites and propose IP compression with some of + them but not others. + +2.23. NAT Traversal + + Network Address Translation (NAT) gateways are a controversial + subject. This section briefly describes what they are and how they + are likely to act on IKE traffic. Many people believe that NATs are + evil and that we should not design our protocols so as to make them + work better. IKEv2 does specify some unintuitive processing rules in + order that NATs are more likely to work. + + NATs exist primarily because of the shortage of IPv4 addresses, + though there are other rationales. IP nodes that are "behind" a NAT + have IP addresses that are not globally unique, but rather are + assigned from some space that is unique within the network behind the + NAT but that are likely to be reused by nodes behind other NATs. + Generally, nodes behind NATs can communicate with other nodes behind + the same NAT and with nodes with globally unique addresses, but not + + + +Kaufman, et al. Expires August 27, 2006 [Page 50] + +Internet-Draft IKEv2bis February 2006 + + + with nodes behind other NATs. There are exceptions to that rule. + When those nodes make connections to nodes on the real Internet, the + NAT gateway "translates" the IP source address to an address that + will be routed back to the gateway. Messages to the gateway from the + Internet have their destination addresses "translated" to the + internal address that will route the packet to the correct endnode. + + NATs are designed to be "transparent" to endnodes. Neither software + on the node behind the NAT nor the node on the Internet requires + modification to communicate through the NAT. Achieving this + transparency is more difficult with some protocols than with others. + Protocols that include IP addresses of the endpoints within the + payloads of the packet will fail unless the NAT gateway understands + the protocol and modifies the internal references as well as those in + the headers. Such knowledge is inherently unreliable, is a network + layer violation, and often results in subtle problems. + + Opening an IPsec connection through a NAT introduces special + problems. If the connection runs in transport mode, changing the IP + addresses on packets will cause the checksums to fail and the NAT + cannot correct the checksums because they are cryptographically + protected. Even in tunnel mode, there are routing problems because + transparently translating the addresses of AH and ESP packets + requires special logic in the NAT and that logic is heuristic and + unreliable in nature. For that reason, IKEv2 can negotiate UDP + encapsulation of IKE and ESP packets. This encoding is slightly less + efficient but is easier for NATs to process. In addition, firewalls + may be configured to pass IPsec traffic over UDP but not ESP/AH or + vice versa. + + It is a common practice of NATs to translate TCP and UDP port numbers + as well as addresses and use the port numbers of inbound packets to + decide which internal node should get a given packet. For this + reason, even though IKE packets MUST be sent from and to UDP port + 500, they MUST be accepted coming from any port and responses MUST be + sent to the port from whence they came. This is because the ports + may be modified as the packets pass through NATs. Similarly, IP + addresses of the IKE endpoints are generally not included in the IKE + payloads because the payloads are cryptographically protected and + could not be transparently modified by NATs. + + Port 4500 is reserved for UDP-encapsulated ESP and IKE. When working + through a NAT, it is generally better to pass IKE packets over port + 4500 because some older NATs handle IKE traffic on port 500 cleverly + in an attempt to transparently establish IPsec connections between + endpoints that don't handle NAT traversal themselves. Such NATs may + interfere with the straightforward NAT traversal envisioned by this + document. {{ Clarif-7.6 }} An IPsec endpoint that discovers a NAT + + + +Kaufman, et al. Expires August 27, 2006 [Page 51] + +Internet-Draft IKEv2bis February 2006 + + + between it and its correspondent MUST send all subsequent traffic + from port 4500, which NATs should not treat specially (as they might + with port 500). + + The specific requirements for supporting NAT traversal [NATREQ] are + listed below. Support for NAT traversal is optional. In this + section only, requirements listed as MUST apply only to + implementations supporting NAT traversal. + + o IKE MUST listen on port 4500 as well as port 500. IKE MUST + respond to the IP address and port from which packets arrived. + + o Both IKE initiator and responder MUST include in their IKE_SA_INIT + packets Notify payloads of type NAT_DETECTION_SOURCE_IP and + NAT_DETECTION_DESTINATION_IP. Those payloads can be used to + detect if there is NAT between the hosts, and which end is behind + the NAT. The location of the payloads in the IKE_SA_INIT packets + are just after the Ni and Nr payloads (before the optional CERTREQ + payload). + + o If none of the NAT_DETECTION_SOURCE_IP payload(s) received matches + the hash of the source IP and port found from the IP header of the + packet containing the payload, it means that the other end is + behind NAT (i.e., someone along the route changed the source + address of the original packet to match the address of the NAT + box). In this case, this end should allow dynamic update of the + other ends IP address, as described later. + + o If the NAT_DETECTION_DESTINATION_IP payload received does not + match the hash of the destination IP and port found from the IP + header of the packet containing the payload, it means that this + end is behind a NAT. In this case, this end SHOULD start sending + keepalive packets as explained in [UDPENCAPS]. + + o The IKE initiator MUST check these payloads if present and if they + do not match the addresses in the outer packet MUST tunnel all + future IKE and ESP packets associated with this IKE_SA over UDP + port 4500. + + o To tunnel IKE packets over UDP port 4500, the IKE header has four + octets of zero prepended and the result immediately follows the + UDP header. To tunnel ESP packets over UDP port 4500, the ESP + header immediately follows the UDP header. Since the first four + bytes of the ESP header contain the SPI, and the SPI cannot + validly be zero, it is always possible to distinguish ESP and IKE + messages. + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 52] + +Internet-Draft IKEv2bis February 2006 + + + o The original source and destination IP address required for the + transport mode TCP and UDP packet checksum fixup (see [UDPENCAPS]) + are obtained from the Traffic Selectors associated with the + exchange. In the case of NAT traversal, the Traffic Selectors + MUST contain exactly one IP address, which is then used as the + original IP address. + + o There are cases where a NAT box decides to remove mappings that + are still alive (for example, the keepalive interval is too long, + or the NAT box is rebooted). To recover in these cases, hosts + that are not behind a NAT SHOULD send all packets (including + retransmission packets) to the IP address and port from the last + valid authenticated packet from the other end (i.e., dynamically + update the address). A host behind a NAT SHOULD NOT do this + because it opens a DoS attack possibility. Any authenticated IKE + packet or any authenticated UDP-encapsulated ESP packet can be + used to detect that the IP address or the port has changed. + + Note that similar but probably not identical actions will likely be + needed to make IKE work with Mobile IP, but such processing is not + addressed by this document. + +2.24. Explicit Congestion Notification (ECN) + + When IPsec tunnels behave as originally specified in [IPSECARCH-OLD], + ECN usage is not appropriate for the outer IP headers because tunnel + decapsulation processing discards ECN congestion indications to the + detriment of the network. ECN support for IPsec tunnels for IKEv1- + based IPsec requires multiple operating modes and negotiation (see + [ECN]). IKEv2 simplifies this situation by requiring that ECN be + usable in the outer IP headers of all tunnel-mode IPsec SAs created + by IKEv2. Specifically, tunnel encapsulators and decapsulators for + all tunnel-mode SAs created by IKEv2 MUST support the ECN full- + functionality option for tunnels specified in [ECN] and MUST + implement the tunnel encapsulation and decapsulation processing + specified in [IPSECARCH] to prevent discarding of ECN congestion + indications. + + +3. Header and Payload Formats + +3.1. The IKE Header + + IKE messages use UDP ports 500 and/or 4500, with one IKE message per + UDP datagram. Information from the beginning of the packet through + the UDP header is largely ignored except that the IP addresses and + UDP ports from the headers are reversed and used for return packets. + When sent on UDP port 500, IKE messages begin immediately following + + + +Kaufman, et al. Expires August 27, 2006 [Page 53] + +Internet-Draft IKEv2bis February 2006 + + + the UDP header. When sent on UDP port 4500, IKE messages have + prepended four octets of zero. These four octets of zero are not + part of the IKE message and are not included in any of the length + fields or checksums defined by IKE. Each IKE message begins with the + IKE header, denoted HDR in this memo. Following the header are one + or more IKE payloads each identified by a "Next Payload" field in the + preceding payload. Payloads are processed in the order in which they + appear in an IKE message by invoking the appropriate processing + routine according to the "Next Payload" field in the IKE header and + subsequently according to the "Next Payload" field in the IKE payload + itself until a "Next Payload" field of zero indicates that no + payloads follow. If a payload of type "Encrypted" is found, that + payload is decrypted and its contents parsed as additional payloads. + An Encrypted payload MUST be the last payload in a packet and an + Encrypted payload MUST NOT contain another Encrypted payload. + + The Recipient SPI in the header identifies an instance of an IKE + security association. It is therefore possible for a single instance + of IKE to multiplex distinct sessions with multiple peers. + + All multi-octet fields representing integers are laid out in big + endian order (aka most significant byte first, or network byte + order). + + The format of the IKE header is shown in Figure 4. + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! IKE_SA Initiator's SPI ! + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! IKE_SA Responder's SPI ! + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload ! MjVer ! MnVer ! Exchange Type ! Flags ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Message ID ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 4: IKE Header Format + + o Initiator's SPI (8 octets) - A value chosen by the initiator to + identify a unique IKE security association. This value MUST NOT + be zero. + + + + +Kaufman, et al. Expires August 27, 2006 [Page 54] + +Internet-Draft IKEv2bis February 2006 + + + o Responder's SPI (8 octets) - A value chosen by the responder to + identify a unique IKE security association. This value MUST be + zero in the first message of an IKE Initial Exchange (including + repeats of that message including a cookie). {{ The phrase "and + MUST NOT be zero in any other message" was removed; Clarif-2.1 }} + + o Next Payload (1 octet) - Indicates the type of payload that + immediately follows the header. The format and value of each + payload are defined below. + + o Major Version (4 bits) - Indicates the major version of the IKE + protocol in use. Implementations based on this version of IKE + MUST set the Major Version to 2. Implementations based on + previous versions of IKE and ISAKMP MUST set the Major Version to + 1. Implementations based on this version of IKE MUST reject or + ignore messages containing a version number greater than 2. + + o Minor Version (4 bits) - Indicates the minor version of the IKE + protocol in use. Implementations based on this version of IKE + MUST set the Minor Version to 0. They MUST ignore the minor + version number of received messages. + + o Exchange Type (1 octet) - Indicates the type of exchange being + used. This constrains the payloads sent in each message and + orderings of messages in an exchange. + + Exchange Type Value + ---------------------------------- + RESERVED 0-33 + IKE_SA_INIT 34 + IKE_AUTH 35 + CREATE_CHILD_SA 36 + INFORMATIONAL 37 + RESERVED TO IANA 38-239 + Reserved for private use 240-255 + + o Flags (1 octet) - Indicates specific options that are set for the + message. Presence of options are indicated by the appropriate bit + in the flags field being set. The bits are defined LSB first, so + bit 0 would be the least significant bit of the Flags octet. In + the description below, a bit being 'set' means its value is '1', + while 'cleared' means its value is '0'. + + * X(reserved) (bits 0-2) - These bits MUST be cleared when + sending and MUST be ignored on receipt. + + * I(nitiator) (bit 3 of Flags) - This bit MUST be set in messages + sent by the original initiator of the IKE_SA and MUST be + + + +Kaufman, et al. Expires August 27, 2006 [Page 55] + +Internet-Draft IKEv2bis February 2006 + + + cleared in messages sent by the original responder. It is used + by the recipient to determine which eight octets of the SPI + were generated by the recipient. + + * V(ersion) (bit 4 of Flags) - This bit indicates that the + transmitter is capable of speaking a higher major version + number of the protocol than the one indicated in the major + version number field. Implementations of IKEv2 must clear this + bit when sending and MUST ignore it in incoming messages. + + * R(esponse) (bit 5 of Flags) - This bit indicates that this + message is a response to a message containing the same message + ID. This bit MUST be cleared in all request messages and MUST + be set in all responses. An IKE endpoint MUST NOT generate a + response to a message that is marked as being a response. + + * X(reserved) (bits 6-7 of Flags) - These bits MUST be cleared + when sending and MUST be ignored on receipt. + + o Message ID (4 octets) - Message identifier used to control + retransmission of lost packets and matching of requests and + responses. It is essential to the security of the protocol + because it is used to prevent message replay attacks. See + Section 2.1 and Section 2.2. + + o Length (4 octets) - Length of total message (header + payloads) in + octets. + +3.2. Generic Payload Header + + Each IKE payload defined in Section 3.3 through Section 3.16 begins + with a generic payload header, shown in Figure 5. Figures for each + payload below will include the generic payload header, but for + brevity the description of each field will be omitted. + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 5: Generic Payload Header + + The Generic Payload Header fields are defined as follows: + + o Next Payload (1 octet) - Identifier for the payload type of the + next payload in the message. If the current payload is the last + in the message, then this field will be 0. This field provides a + + + +Kaufman, et al. Expires August 27, 2006 [Page 56] + +Internet-Draft IKEv2bis February 2006 + + + "chaining" capability whereby additional payloads can be added to + a message by appending it to the end of the message and setting + the "Next Payload" field of the preceding payload to indicate the + new payload's type. An Encrypted payload, which must always be + the last payload of a message, is an exception. It contains data + structures in the format of additional payloads. In the header of + an Encrypted payload, the Next Payload field is set to the payload + type of the first contained payload (instead of 0). The payload + type values are: + + Next Payload Type Notation Value + -------------------------------------------------- + No Next Payload 0 + RESERVED 1-32 + Security Association SA 33 + Key Exchange KE 34 + Identification - Initiator IDi 35 + Identification - Responder IDr 36 + Certificate CERT 37 + Certificate Request CERTREQ 38 + Authentication AUTH 39 + Nonce Ni, Nr 40 + Notify N 41 + Delete D 42 + Vendor ID V 43 + Traffic Selector - Initiator TSi 44 + Traffic Selector - Responder TSr 45 + Encrypted E 46 + Configuration CP 47 + Extensible Authentication EAP 48 + RESERVED TO IANA 49-127 + PRIVATE USE 128-255 + + (Payload type values 1-32 should not be assigned in the + future so that there is no overlap with the code assignments + for IKEv1.) + + o Critical (1 bit) - MUST be set to zero if the sender wants the + recipient to skip this payload if it does not understand the + payload type code in the Next Payload field of the previous + payload. MUST be set to one if the sender wants the recipient to + reject this entire message if it does not understand the payload + type. MUST be ignored by the recipient if the recipient + understands the payload type code. MUST be set to zero for + payload types defined in this document. Note that the critical + bit applies to the current payload rather than the "next" payload + whose type code appears in the first octet. The reasoning behind + not setting the critical bit for payloads defined in this document + + + +Kaufman, et al. Expires August 27, 2006 [Page 57] + +Internet-Draft IKEv2bis February 2006 + + + is that all implementations MUST understand all payload types + defined in this document and therefore must ignore the Critical + bit's value. Skipped payloads are expected to have valid Next + Payload and Payload Length fields. + + o RESERVED (7 bits) - MUST be sent as zero; MUST be ignored on + receipt. + + o Payload Length (2 octets) - Length in octets of the current + payload, including the generic payload header. + +3.3. Security Association Payload + + The Security Association Payload, denoted SA in this memo, is used to + negotiate attributes of a security association. Assembly of Security + Association Payloads requires great peace of mind. An SA payload MAY + contain multiple proposals. If there is more than one, they MUST be + ordered from most preferred to least preferred. Each proposal may + contain multiple IPsec protocols (where a protocol is IKE, ESP, or + AH), each protocol MAY contain multiple transforms, and each + transform MAY contain multiple attributes. When parsing an SA, an + implementation MUST check that the total Payload Length is consistent + with the payload's internal lengths and counts. Proposals, + Transforms, and Attributes each have their own variable length + encodings. They are nested such that the Payload Length of an SA + includes the combined contents of the SA, Proposal, Transform, and + Attribute information. The length of a Proposal includes the lengths + of all Transforms and Attributes it contains. The length of a + Transform includes the lengths of all Attributes it contains. + + The syntax of Security Associations, Proposals, Transforms, and + Attributes is based on ISAKMP; however the semantics are somewhat + different. The reason for the complexity and the hierarchy is to + allow for multiple possible combinations of algorithms to be encoded + in a single SA. Sometimes there is a choice of multiple algorithms, + whereas other times there is a combination of algorithms. For + example, an initiator might want to propose using (AH w/MD5 and ESP + w/3DES) OR (ESP w/MD5 and 3DES). + + One of the reasons the semantics of the SA payload has changed from + ISAKMP and IKEv1 is to make the encodings more compact in common + cases. + + The Proposal structure contains within it a Proposal # and an IPsec + protocol ID. Each structure MUST have the same Proposal # as the + previous one or be one (1) greater. The first Proposal MUST have a + Proposal # of one (1). If two successive structures have the same + Proposal number, it means that the proposal consists of the first + + + +Kaufman, et al. Expires August 27, 2006 [Page 58] + +Internet-Draft IKEv2bis February 2006 + + + structure AND the second. So a proposal of AH AND ESP would have two + proposal structures, one for AH and one for ESP and both would have + Proposal #1. A proposal of AH OR ESP would have two proposal + structures, one for AH with Proposal #1 and one for ESP with Proposal + #2. + + Each Proposal/Protocol structure is followed by one or more transform + structures. The number of different transforms is generally + determined by the Protocol. AH generally has a single transform: an + integrity check algorithm. ESP generally has two: an encryption + algorithm and an integrity check algorithm. IKE generally has four + transforms: a Diffie-Hellman group, an integrity check algorithm, a + prf algorithm, and an encryption algorithm. If an algorithm that + combines encryption and integrity protection is proposed, it MUST be + proposed as an encryption algorithm and an integrity protection + algorithm MUST NOT be proposed. For each Protocol, the set of + permissible transforms is assigned transform ID numbers, which appear + in the header of each transform. + + If there are multiple transforms with the same Transform Type, the + proposal is an OR of those transforms. If there are multiple + Transforms with different Transform Types, the proposal is an AND of + the different groups. For example, to propose ESP with (3DES or + IDEA) and (HMAC_MD5 or HMAC_SHA), the ESP proposal would contain two + Transform Type 1 candidates (one for 3DES and one for IDEA) and two + Transform Type 2 candidates (one for HMAC_MD5 and one for HMAC_SHA). + This effectively proposes four combinations of algorithms. If the + initiator wanted to propose only a subset of those, for example (3DES + and HMAC_MD5) or (IDEA and HMAC_SHA), there is no way to encode that + as multiple transforms within a single Proposal. Instead, the + initiator would have to construct two different Proposals, each with + two transforms. + + A given transform MAY have one or more Attributes. Attributes are + necessary when the transform can be used in more than one way, as + when an encryption algorithm has a variable key size. The transform + would specify the algorithm and the attribute would specify the key + size. Most transforms do not have attributes. A transform MUST NOT + have multiple attributes of the same type. To propose alternate + values for an attribute (for example, multiple key sizes for the AES + encryption algorithm), and implementation MUST include multiple + Transforms with the same Transform Type each with a single Attribute. + + Note that the semantics of Transforms and Attributes are quite + different from those in IKEv1. In IKEv1, a single Transform carried + multiple algorithms for a protocol with one carried in the Transform + and the others carried in the Attributes. + + + + +Kaufman, et al. Expires August 27, 2006 [Page 59] + +Internet-Draft IKEv2bis February 2006 + + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ <Proposals> ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 6: Security Association Payload + + o Proposals (variable) - One or more proposal substructures. + + The payload type for the Security Association Payload is thirty three + (33). + +3.3.1. Proposal Substructure + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! 0 (last) or 2 ! RESERVED ! Proposal Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Proposal # ! Protocol ID ! SPI Size !# of Transforms! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ~ SPI (variable) ~ + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ <Transforms> ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 7: Proposal Substructure + + o 0 (last) or 2 (more) (1 octet) - Specifies whether this is the + last Proposal Substructure in the SA. This syntax is inherited + from ISAKMP, but is unnecessary because the last Proposal could be + identified from the length of the SA. The value (2) corresponds + to a Payload Type of Proposal in IKEv1, and the first four octets + of the Proposal structure are designed to look somewhat like the + header of a Payload. + + o RESERVED (1 octet) - MUST be sent as zero; MUST be ignored on + receipt. + + o Proposal Length (2 octets) - Length of this proposal, including + all transforms and attributes that follow. + + + +Kaufman, et al. Expires August 27, 2006 [Page 60] + +Internet-Draft IKEv2bis February 2006 + + + o Proposal # (1 octet) - When a proposal is made, the first proposal + in an SA payload MUST be #1, and subsequent proposals MUST either + be the same as the previous proposal (indicating an AND of the two + proposals) or one more than the previous proposal (indicating an + OR of the two proposals). When a proposal is accepted, all of the + proposal numbers in the SA payload MUST be the same and MUST match + the number on the proposal sent that was accepted. + + o Protocol ID (1 octet) - Specifies the IPsec protocol identifier + for the current negotiation. The defined values are: + + Protocol Protocol ID + ----------------------------------- + RESERVED 0 + IKE 1 + AH 2 + ESP 3 + RESERVED TO IANA 4-200 + PRIVATE USE 201-255 + + o SPI Size (1 octet) - For an initial IKE_SA negotiation, this field + MUST be zero; the SPI is obtained from the outer header. During + subsequent negotiations, it is equal to the size, in octets, of + the SPI of the corresponding protocol (8 for IKE, 4 for ESP and + AH). + + o # of Transforms (1 octet) - Specifies the number of transforms in + this proposal. + + o SPI (variable) - The sending entity's SPI. Even if the SPI Size + is not a multiple of 4 octets, there is no padding applied to the + payload. When the SPI Size field is zero, this field is not + present in the Security Association payload. + + o Transforms (variable) - One or more transform substructures. + + + + + + + + + + + + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 61] + +Internet-Draft IKEv2bis February 2006 + + +3.3.2. Transform Substructure + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! 0 (last) or 3 ! RESERVED ! Transform Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + !Transform Type ! RESERVED ! Transform ID ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Transform Attributes ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 8: Transform Substructure + + o 0 (last) or 3 (more) (1 octet) - Specifies whether this is the + last Transform Substructure in the Proposal. This syntax is + inherited from ISAKMP, but is unnecessary because the last + Proposal could be identified from the length of the SA. The value + (3) corresponds to a Payload Type of Transform in IKEv1, and the + first four octets of the Transform structure are designed to look + somewhat like the header of a Payload. + + o RESERVED - MUST be sent as zero; MUST be ignored on receipt. + + o Transform Length - The length (in octets) of the Transform + Substructure including Header and Attributes. + + o Transform Type (1 octet) - The type of transform being specified + in this transform. Different protocols support different + transform types. For some protocols, some of the transforms may + be optional. If a transform is optional and the initiator wishes + to propose that the transform be omitted, no transform of the + given type is included in the proposal. If the initiator wishes + to make use of the transform optional to the responder, it + includes a transform substructure with transform ID = 0 as one of + the options. + + o Transform ID (2 octets) - The specific instance of the transform + type being proposed. + + The tranform type values are: + + + + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 62] + +Internet-Draft IKEv2bis February 2006 + + + Description Trans. Used In + Type + ------------------------------------------------------------------ + RESERVED 0 + Encryption Algorithm (ENCR) 1 IKE and ESP + Pseudo-random Function (PRF) 2 IKE + Integrity Algorithm (INTEG) 3 IKE, AH, optional in ESP + Diffie-Hellman Group (D-H) 4 IKE, optional in AH & ESP + Extended Sequence Numbers (ESN) 5 AH and ESP + RESERVED TO IANA 6-240 + PRIVATE USE 241-255 + + For Transform Type 1 (Encryption Algorithm), defined Transform IDs + are: + + Name Number Defined In + --------------------------------------------------- + RESERVED 0 + ENCR_DES_IV64 1 (RFC1827) + ENCR_DES 2 (RFC2405), [DES] + ENCR_3DES 3 (RFC2451) + ENCR_RC5 4 (RFC2451) + ENCR_IDEA 5 (RFC2451), [IDEA] + ENCR_CAST 6 (RFC2451) + ENCR_BLOWFISH 7 (RFC2451) + ENCR_3IDEA 8 (RFC2451) + ENCR_DES_IV32 9 + RESERVED 10 + ENCR_NULL 11 (RFC2410) + ENCR_AES_CBC 12 (RFC3602) + ENCR_AES_CTR 13 (RFC3664) + RESERVED TO IANA 14-1023 + PRIVATE USE 1024-65535 + + For Transform Type 2 (Pseudo-random Function), defined Transform IDs + are: + + Name Number Defined In + ------------------------------------------------------ + RESERVED 0 + PRF_HMAC_MD5 1 (RFC2104), [MD5] + PRF_HMAC_SHA1 2 (RFC2104), [SHA] + PRF_HMAC_TIGER 3 (RFC2104) + PRF_AES128_XCBC 4 (RFC3664) + RESERVED TO IANA 5-1023 + PRIVATE USE 1024-65535 + + For Transform Type 3 (Integrity Algorithm), defined Transform IDs + + + +Kaufman, et al. Expires August 27, 2006 [Page 63] + +Internet-Draft IKEv2bis February 2006 + + + are: + + Name Number Defined In + ---------------------------------------- + NONE 0 + AUTH_HMAC_MD5_96 1 (RFC2403) + AUTH_HMAC_SHA1_96 2 (RFC2404) + AUTH_DES_MAC 3 + AUTH_KPDK_MD5 4 (RFC1826) + AUTH_AES_XCBC_96 5 (RFC3566) + RESERVED TO IANA 6-1023 + PRIVATE USE 1024-65535 + + For Transform Type 4 (Diffie-Hellman Group), defined Transform IDs + are: + + Name Number + -------------------------------------- + NONE 0 + Defined in Appendix B 1 - 2 + RESERVED 3 - 4 + Defined in [ADDGROUP] 5 + RESERVED TO IANA 6 - 13 + Defined in [ADDGROUP] 14 - 18 + RESERVED TO IANA 19 - 1023 + PRIVATE USE 1024-65535 + + For Transform Type 5 (Extended Sequence Numbers), defined Transform + IDs are: + + Name Number + -------------------------------------------- + No Extended Sequence Numbers 0 + Extended Sequence Numbers 1 + RESERVED 2 - 65535 + +3.3.3. Valid Transform Types by Protocol + + The number and type of transforms that accompany an SA payload are + dependent on the protocol in the SA itself. An SA payload proposing + the establishment of an SA has the following mandatory and optional + transform types. A compliant implementation MUST understand all + mandatory and optional types for each protocol it supports (though it + need not accept proposals with unacceptable suites). A proposal MAY + omit the optional types if the only value for them it will accept is + NONE. + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 64] + +Internet-Draft IKEv2bis February 2006 + + + Protocol Mandatory Types Optional Types + --------------------------------------------------- + IKE ENCR, PRF, INTEG, D-H + ESP ENCR, ESN INTEG, D-H + AH INTEG, ESN D-H + +3.3.4. Mandatory Transform IDs + + The specification of suites that MUST and SHOULD be supported for + interoperability has been removed from this document because they are + likely to change more rapidly than this document evolves. + + An important lesson learned from IKEv1 is that no system should only + implement the mandatory algorithms and expect them to be the best + choice for all customers. For example, at the time that this + document was written, many IKEv1 implementers were starting to + migrate to AES in Cipher Block Chaining (CBC) mode for Virtual + Private Network (VPN) applications. Many IPsec systems based on + IKEv2 will implement AES, additional Diffie-Hellman groups, and + additional hash algorithms, and some IPsec customers already require + these algorithms in addition to the ones listed above. + + It is likely that IANA will add additional transforms in the future, + and some users may want to use private suites, especially for IKE + where implementations should be capable of supporting different + parameters, up to certain size limits. In support of this goal, all + implementations of IKEv2 SHOULD include a management facility that + allows specification (by a user or system administrator) of Diffie- + Hellman (DH) parameters (the generator, modulus, and exponent lengths + and values) for new DH groups. Implementations SHOULD provide a + management interface through which these parameters and the + associated transform IDs may be entered (by a user or system + administrator), to enable negotiating such groups. + + All implementations of IKEv2 MUST include a management facility that + enables a user or system administrator to specify the suites that are + acceptable for use with IKE. Upon receipt of a payload with a set of + transform IDs, the implementation MUST compare the transmitted + transform IDs against those locally configured via the management + controls, to verify that the proposed suite is acceptable based on + local policy. The implementation MUST reject SA proposals that are + not authorized by these IKE suite controls. Note that cryptographic + suites that MUST be implemented need not be configured as acceptable + to local policy. + + + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 65] + +Internet-Draft IKEv2bis February 2006 + + +3.3.5. Transform Attributes + + Each transform in a Security Association payload may include + attributes that modify or complete the specification of the + transform. These attributes are type/value pairs and are defined + below. For example, if an encryption algorithm has a variable-length + key, the key length to be used may be specified as an attribute. + Attributes can have a value with a fixed two octet length or a + variable-length value. For the latter, the attribute is encoded as + type/length/value. + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + !A! Attribute Type ! AF=0 Attribute Length ! + !F! ! AF=1 Attribute Value ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! AF=0 Attribute Value ! + ! AF=1 Not Transmitted ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 9: Data Attributes + + o Attribute Type (2 octets) - Unique identifier for each type of + attribute (see below). The most significant bit of this field is + the Attribute Format bit (AF). It indicates whether the data + attributes follow the Type/Length/Value (TLV) format or a + shortened Type/Value (TV) format. If the AF bit is zero (0), then + the Data Attributes are of the Type/Length/Value (TLV) form. If + the AF bit is a one (1), then the Data Attributes are of the Type/ + Value form. + + o Attribute Length (2 octets) - Length in octets of the Attribute + Value. When the AF bit is a one (1), the Attribute Value is only + 2 octets and the Attribute Length field is not present. + + o Attribute Value (variable length) - Value of the Attribute + associated with the Attribute Type. If the AF bit is a zero (0), + this field has a variable length defined by the Attribute Length + field. If the AF bit is a one (1), the Attribute Value has a + length of 2 octets. + + o Key Length - When using an Encryption Algorithm that has a + variable-length key, this attribute specifies the key length in + bits (MUST use network byte order). This attribute MUST NOT be + used when the specified Encryption Algorithm uses a fixed-length + key. + + + + +Kaufman, et al. Expires August 27, 2006 [Page 66] + +Internet-Draft IKEv2bis February 2006 + + + Note that only a single attribute type (Key Length) is defined, and + it is fixed length. The variable-length encoding specification is + included only for future extensions. {{ Clarif-7.11 removed the + sentence that listed, incorrectly, the algorithms defined in the + document that accept attributes. }} + + Attributes described as basic MUST NOT be encoded using the variable- + length encoding. Variable-length attributes MUST NOT be encoded as + basic even if their value can fit into two octets. NOTE: This is a + change from IKEv1, where increased flexibility may have simplified + the composer of messages but certainly complicated the parser. + + Attribute Type Value Attribute Format + ------------------------------------------------------------ + RESERVED 0-13 + Key Length (in bits) 14 TV + RESERVED 15-17 + RESERVED TO IANA 18-16383 + PRIVATE USE 16384-32767 + Values 0-13 and 15-17 were used in a similar context in + IKEv1, and should not be assigned except to matching values. + +3.3.6. Attribute Negotiation + + During security association negotiation initiators present offers to + responders. Responders MUST select a single complete set of + parameters from the offers (or reject all offers if none are + acceptable). If there are multiple proposals, the responder MUST + choose a single proposal number and return all of the Proposal + substructures with that Proposal number. If there are multiple + Transforms with the same type, the responder MUST choose a single + one. Any attributes of a selected transform MUST be returned + unmodified. The initiator of an exchange MUST check that the + accepted offer is consistent with one of its proposals, and if not + that response MUST be rejected. + + Negotiating Diffie-Hellman groups presents some special challenges. + SA offers include proposed attributes and a Diffie-Hellman public + number (KE) in the same message. If in the initial exchange the + initiator offers to use one of several Diffie-Hellman groups, it + SHOULD pick the one the responder is most likely to accept and + include a KE corresponding to that group. If the guess turns out to + be wrong, the responder will indicate the correct group in the + response and the initiator SHOULD pick an element of that group for + its KE value when retrying the first message. It SHOULD, however, + continue to propose its full supported set of groups in order to + prevent a man-in-the-middle downgrade attack. + + + + +Kaufman, et al. Expires August 27, 2006 [Page 67] + +Internet-Draft IKEv2bis February 2006 + + + Implementation Note: + + Certain negotiable attributes can have ranges or could have multiple + acceptable values. These include the key length of a variable key + length symmetric cipher. To further interoperability and to support + upgrading endpoints independently, implementers of this protocol + SHOULD accept values that they deem to supply greater security. For + instance, if a peer is configured to accept a variable-length cipher + with a key length of X bits and is offered that cipher with a larger + key length, the implementation SHOULD accept the offer if it supports + use of the longer key. + + Support of this capability allows an implementation to express a + concept of "at least" a certain level of security-- "a key length of + _at least_ X bits for cipher Y". + +3.4. Key Exchange Payload + + The Key Exchange Payload, denoted KE in this memo, is used to + exchange Diffie-Hellman public numbers as part of a Diffie-Hellman + key exchange. The Key Exchange Payload consists of the IKE generic + payload header followed by the Diffie-Hellman public value itself. + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! DH Group # ! RESERVED ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Key Exchange Data ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 10: Key Exchange Payload Format + + A key exchange payload is constructed by copying one's Diffie-Hellman + public value into the "Key Exchange Data" portion of the payload. + The length of the Diffie-Hellman public value MUST be equal to the + length of the prime modulus over which the exponentiation was + performed, prepending zero bits to the value if necessary. + + The DH Group # identifies the Diffie-Hellman group in which the Key + Exchange Data was computed (see Section 3.3.2). If the selected + proposal uses a different Diffie-Hellman group, the message MUST be + rejected with a Notify payload of type INVALID_KE_PAYLOAD. + + + + +Kaufman, et al. Expires August 27, 2006 [Page 68] + +Internet-Draft IKEv2bis February 2006 + + + The payload type for the Key Exchange payload is thirty four (34). + +3.5. Identification Payloads + + The Identification Payloads, denoted IDi and IDr in this memo, allow + peers to assert an identity to one another. This identity may be + used for policy lookup, but does not necessarily have to match + anything in the CERT payload; both fields may be used by an + implementation to perform access control decisions. {{ Clarif-7.1 }} + When using the ID_IPV4_ADDR/ID_IPV6_ADDR identity types in IDi/IDr + payloads, IKEv2 does not require this address to match the address in + the IP header of IKEv2 packets, or anything in the TSi/TSr payloads. + The contents of IDi/IDr is used purely to fetch the policy and + authentication data related to the other party. + + NOTE: In IKEv1, two ID payloads were used in each direction to hold + Traffic Selector (TS) information for data passing over the SA. In + IKEv2, this information is carried in TS payloads (see Section 3.13). + + The Identification Payload consists of the IKE generic payload header + followed by identification fields as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ID Type ! RESERVED | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Identification Data ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 11: Identification Payload Format + + o ID Type (1 octet) - Specifies the type of Identification being + used. + + o RESERVED - MUST be sent as zero; MUST be ignored on receipt. + + o Identification Data (variable length) - Value, as indicated by the + Identification Type. The length of the Identification Data is + computed from the size in the ID payload header. + + The payload types for the Identification Payload are thirty five (35) + for IDi and thirty six (36) for IDr. + + + + +Kaufman, et al. Expires August 27, 2006 [Page 69] + +Internet-Draft IKEv2bis February 2006 + + + The following table lists the assigned values for the Identification + Type field: + + ID Type Value + ------------------------------------------------------------------- + RESERVED 0 + + ID_IPV4_ADDR 1 + A single four (4) octet IPv4 address. + + ID_FQDN 2 + A fully-qualified domain name string. An example of a ID_FQDN + is, "example.com". The string MUST not contain any terminators + (e.g., NULL, CR, etc.). + + ID_RFC822_ADDR 3 + A fully-qualified RFC822 email address string, An example of a + ID_RFC822_ADDR is, "jsmith@example.com". The string MUST not + contain any terminators. + + RESERVED TO IANA 4 + + ID_IPV6_ADDR 5 + A single sixteen (16) octet IPv6 address. + + RESERVED TO IANA 6 - 8 + + ID_DER_ASN1_DN 9 + The binary Distinguished Encoding Rules (DER) encoding of an + ASN.1 X.500 Distinguished Name [X.501]. + + ID_DER_ASN1_GN 10 + The binary DER encoding of an ASN.1 X.500 GeneralName [X.509]. + + ID_KEY_ID 11 + An opaque octet stream which may be used to pass vendor- + specific information necessary to do certain proprietary + types of identification. + + RESERVED TO IANA 12-200 + + PRIVATE USE 201-255 + + Two implementations will interoperate only if each can generate a + type of ID acceptable to the other. To assure maximum + interoperability, implementations MUST be configurable to send at + least one of ID_IPV4_ADDR, ID_FQDN, ID_RFC822_ADDR, or ID_KEY_ID, and + MUST be configurable to accept all of these types. Implementations + + + +Kaufman, et al. Expires August 27, 2006 [Page 70] + +Internet-Draft IKEv2bis February 2006 + + + SHOULD be capable of generating and accepting all of these types. + IPv6-capable implementations MUST additionally be configurable to + accept ID_IPV6_ADDR. IPv6-only implementations MAY be configurable + to send only ID_IPV6_ADDR. + + {{ Clarif-3.4 }} EAP [EAP] does not mandate the use of any particular + type of identifier, but often EAP is used with Network Access + Identifiers (NAIs) defined in [NAI]. Although NAIs look a bit like + email addresses (e.g., "joe@example.com"), the syntax is not exactly + the same as the syntax of email address in [MAILFORMAT]. For those + NAIs that include the realm component, the ID_RFC822_ADDR + identification type SHOULD be used. Responder implementations should + not attempt to verify that the contents actually conform to the exact + syntax given in [MAILFORMAT], but instead should accept any + reasonable-looking NAI. For NAIs that do not include the realm + component,the ID_KEY_ID identification type SHOULD be used. + +3.6. Certificate Payload + + The Certificate Payload, denoted CERT in this memo, provides a means + to transport certificates or other authentication-related information + via IKE. Certificate payloads SHOULD be included in an exchange if + certificates are available to the sender unless the peer has + indicated an ability to retrieve this information from elsewhere + using an HTTP_CERT_LOOKUP_SUPPORTED Notify payload. Note that the + term "Certificate Payload" is somewhat misleading, because not all + authentication mechanisms use certificates and data other than + certificates may be passed in this payload. + + The Certificate Payload is defined as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Cert Encoding ! ! + +-+-+-+-+-+-+-+-+ ! + ~ Certificate Data ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 12: Certificate Payload Format + + o Certificate Encoding (1 octet) - This field indicates the type of + certificate or certificate-related information contained in the + Certificate Data field. + + + + +Kaufman, et al. Expires August 27, 2006 [Page 71] + +Internet-Draft IKEv2bis February 2006 + + + Certificate Encoding Value + ------------------------------------------------- + RESERVED 0 + PKCS #7 wrapped X.509 certificate 1 + PGP Certificate 2 + DNS Signed Key 3 + X.509 Certificate - Signature 4 + Kerberos Token 6 + Certificate Revocation List (CRL) 7 + Authority Revocation List (ARL) 8 + SPKI Certificate 9 + X.509 Certificate - Attribute 10 + Raw RSA Key 11 + Hash and URL of X.509 certificate 12 + Hash and URL of X.509 bundle 13 + RESERVED to IANA 14 - 200 + PRIVATE USE 201 - 255 + + o Certificate Data (variable length) - Actual encoding of + certificate data. The type of certificate is indicated by the + Certificate Encoding field. + + The payload type for the Certificate Payload is thirty seven (37). + + Specific syntax is for some of the certificate type codes above is + not defined in this document. The types whose syntax is defined in + this document are: + + o X.509 Certificate - Signature (4) contains a DER encoded X.509 + certificate whose public key is used to validate the sender's AUTH + payload. + + o Certificate Revocation List (7) contains a DER encoded X.509 + certificate revocation list. + + o {{ Added "DER-encoded RSAPublicKey structure" from Clarif-3.6 }} + Raw RSA Key (11) contains a PKCS #1 encoded RSA key, that is, a + DER-encoded RSAPublicKey structure (see [RSA] and [PKCS1]). + + o Hash and URL encodings (12-13) allow IKE messages to remain short + by replacing long data structures with a 20 octet SHA-1 hash (see + [SHA]) of the replaced value followed by a variable-length URL + that resolves to the DER encoded data structure itself. This + improves efficiency when the endpoints have certificate data + cached and makes IKE less subject to denial of service attacks + that become easier to mount when IKE messages are large enough to + require IP fragmentation [DOSUDPPROT]. + + + + +Kaufman, et al. Expires August 27, 2006 [Page 72] + +Internet-Draft IKEv2bis February 2006 + + + Use the following ASN.1 definition for an X.509 bundle: + + CertBundle + { iso(1) identified-organization(3) dod(6) internet(1) + security(5) mechanisms(5) pkix(7) id-mod(0) + id-mod-cert-bundle(34) } + + DEFINITIONS EXPLICIT TAGS ::= + BEGIN + + IMPORTS + Certificate, CertificateList + FROM PKIX1Explicit88 + { iso(1) identified-organization(3) dod(6) + internet(1) security(5) mechanisms(5) pkix(7) + id-mod(0) id-pkix1-explicit(18) } ; + + CertificateOrCRL ::= CHOICE { + cert [0] Certificate, + crl [1] CertificateList } + + CertificateBundle ::= SEQUENCE OF CertificateOrCRL + + END + + Implementations MUST be capable of being configured to send and + accept up to four X.509 certificates in support of authentication, + and also MUST be capable of being configured to send and accept the + first two Hash and URL formats (with HTTP URLs). Implementations + SHOULD be capable of being configured to send and accept Raw RSA + keys. If multiple certificates are sent, the first certificate MUST + contain the public key used to sign the AUTH payload. The other + certificates may be sent in any order. + + {{ Clarif-3.6 }} Because the contents and use of some of the + certificate types are not defined, they SHOULD NOT be used. In + specific, implementations SHOULD NOT use the following types unless + they are later defined in a standards-track document: + + PKCS #7 wrapped X.509 certificate 1 + PGP Certificate 2 + DNS Signed Key 3 + Kerberos Token 6 + SPKI Certificate 9 + + + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 73] + +Internet-Draft IKEv2bis February 2006 + + +3.7. Certificate Request Payload + + The Certificate Request Payload, denoted CERTREQ in this memo, + provides a means to request preferred certificates via IKE and can + appear in the IKE_INIT_SA response and/or the IKE_AUTH request. + Certificate Request payloads MAY be included in an exchange when the + sender needs to get the certificate of the receiver. If multiple CAs + are trusted and the cert encoding does not allow a list, then + multiple Certificate Request payloads SHOULD be transmitted. + + The Certificate Request Payload is defined as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Cert Encoding ! ! + +-+-+-+-+-+-+-+-+ ! + ~ Certification Authority ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 13: Certificate Request Payload Format + + o Certificate Encoding (1 octet) - Contains an encoding of the type + or format of certificate requested. Values are listed in + Section 3.6. + + o Certification Authority (variable length) - Contains an encoding + of an acceptable certification authority for the type of + certificate requested. + + The payload type for the Certificate Request Payload is thirty eight + (38). + + The Certificate Encoding field has the same values as those defined + in Section 3.6. The Certification Authority field contains an + indicator of trusted authorities for this certificate type. The + Certification Authority value is a concatenated list of SHA-1 hashes + of the public keys of trusted Certification Authorities (CAs). Each + is encoded as the SHA-1 hash of the Subject Public Key Info element + (see section 4.1.2.7 of [PKIX]) from each Trust Anchor certificate. + The twenty-octet hashes are concatenated and included with no other + formatting. + + {{ Clarif-3.6 }} The contents of the "Certification Authority" field + are defined only for X.509 certificates, which are types 4, 10, 12, + + + +Kaufman, et al. Expires August 27, 2006 [Page 74] + +Internet-Draft IKEv2bis February 2006 + + + and 13. Other values SHOULD NOT be used until standards-track + specifications that specify their use are published. + + Note that the term "Certificate Request" is somewhat misleading, in + that values other than certificates are defined in a "Certificate" + payload and requests for those values can be present in a Certificate + Request Payload. The syntax of the Certificate Request payload in + such cases is not defined in this document. + + The Certificate Request Payload is processed by inspecting the "Cert + Encoding" field to determine whether the processor has any + certificates of this type. If so, the "Certification Authority" + field is inspected to determine if the processor has any certificates + that can be validated up to one of the specified certification + authorities. This can be a chain of certificates. + + If an end-entity certificate exists that satisfies the criteria + specified in the CERTREQ, a certificate or certificate chain SHOULD + be sent back to the certificate requestor if the recipient of the + CERTREQ: + + o is configured to use certificate authentication, + + o is allowed to send a CERT payload, + + o has matching CA trust policy governing the current negotiation, + and + + o has at least one time-wise and usage appropriate end-entity + certificate chaining to a CA provided in the CERTREQ. + + Certificate revocation checking must be considered during the + chaining process used to select a certificate. Note that even if two + peers are configured to use two different CAs, cross-certification + relationships should be supported by appropriate selection logic. + + The intent is not to prevent communication through the strict + adherence of selection of a certificate based on CERTREQ, when an + alternate certificate could be selected by the sender that would + still enable the recipient to successfully validate and trust it + through trust conveyed by cross-certification, CRLs, or other out-of- + band configured means. Thus, the processing of a CERTREQ should be + seen as a suggestion for a certificate to select, not a mandated one. + If no certificates exist, then the CERTREQ is ignored. This is not + an error condition of the protocol. There may be cases where there + is a preferred CA sent in the CERTREQ, but an alternate might be + acceptable (perhaps after prompting a human operator). + + + + +Kaufman, et al. Expires August 27, 2006 [Page 75] + +Internet-Draft IKEv2bis February 2006 + + +3.8. Authentication Payload + + The Authentication Payload, denoted AUTH in this memo, contains data + used for authentication purposes. The syntax of the Authentication + data varies according to the Auth Method as specified below. + + The Authentication Payload is defined as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Auth Method ! RESERVED ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Authentication Data ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 14: Authentication Payload Format + + o Auth Method (1 octet) - Specifies the method of authentication + used. Values defined are: + + * RSA Digital Signature (1) - Computed as specified in + Section 2.15 using an RSA private key over a PKCS#1 padded hash + (see [RSA] and [PKCS1]). {{ Clarif-3.2 }} To promote + interoperability, implementations that support this type SHOULD + support signatures that use SHA-1 as the hash function and + SHOULD use SHA-1 as the default hash function when generating + signatures. {{ Clarif-3.3 }} A newer version of PKCS#1 (v2.1) + defines two different encoding methods (ways of "padding the + hash") for signatures. However, IKEv2 and this document point + specifically to the PKCS#1 v2.0 which has only one encoding + method for signatures (EMSA-PKCS1- v1_5). + + * Shared Key Message Integrity Code (2) - Computed as specified + in Section 2.15 using the shared key associated with the + identity in the ID payload and the negotiated prf function + + * DSS Digital Signature (3) - Computed as specified in + Section 2.15 using a DSS private key (see [DSS]) over a SHA-1 + hash. + + * The values 0 and 4-200 are reserved to IANA. The values 201- + 255 are available for private use. + + + + +Kaufman, et al. Expires August 27, 2006 [Page 76] + +Internet-Draft IKEv2bis February 2006 + + + o Authentication Data (variable length) - see Section 2.15. + + The payload type for the Authentication Payload is thirty nine (39). + +3.9. Nonce Payload + + The Nonce Payload, denoted Ni and Nr in this memo for the initiator's + and responder's nonce respectively, contains random data used to + guarantee liveness during an exchange and protect against replay + attacks. + + The Nonce Payload is defined as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Nonce Data ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 15: Nonce Payload Format + + o Nonce Data (variable length) - Contains the random data generated + by the transmitting entity. + + The payload type for the Nonce Payload is forty (40). + + The size of a Nonce MUST be between 16 and 256 octets inclusive. + Nonce values MUST NOT be reused. + +3.10. Notify Payload + + The Notify Payload, denoted N in this document, is used to transmit + informational data, such as error conditions and state transitions, + to an IKE peer. A Notify Payload may appear in a response message + (usually specifying why a request was rejected), in an INFORMATIONAL + Exchange (to report an error not in an IKE request), or in any other + message to indicate sender capabilities or to modify the meaning of + the request. + + The Notify Payload is defined as follows: + + + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 77] + +Internet-Draft IKEv2bis February 2006 + + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Protocol ID ! SPI Size ! Notify Message Type ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Security Parameter Index (SPI) ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Notification Data ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 16: Notify Payload Format + + o Protocol ID (1 octet) - If this notification concerns an existing + SA, this field indicates the type of that SA. For IKE_SA + notifications, this field MUST be one (1). For notifications + concerning IPsec SAs this field MUST contain either (2) to + indicate AH or (3) to indicate ESP. {{ Clarif-7.8 }} For + notifications that do not relate to an existing SA, this field + MUST be sent as zero and MUST be ignored on receipt; this is + currently only true for the INVALID_SELECTORS and REKEY_SA + notifications. All other values for this field are reserved to + IANA for future assignment. + + o SPI Size (1 octet) - Length in octets of the SPI as defined by the + IPsec protocol ID or zero if no SPI is applicable. For a + notification concerning the IKE_SA, the SPI Size MUST be zero. + + o Notify Message Type (2 octets) - Specifies the type of + notification message. + + o SPI (variable length) - Security Parameter Index. + + o Notification Data (variable length) - Informational or error data + transmitted in addition to the Notify Message Type. Values for + this field are type specific (see below). + + The payload type for the Notify Payload is forty one (41). + +3.10.1. Notify Message Types + + Notification information can be error messages specifying why an SA + could not be established. It can also be status data that a process + + + +Kaufman, et al. Expires August 27, 2006 [Page 78] + +Internet-Draft IKEv2bis February 2006 + + + managing an SA database wishes to communicate with a peer process. + The table below lists the Notification messages and their + corresponding values. The number of different error statuses was + greatly reduced from IKEv1 both for simplification and to avoid + giving configuration information to probers. + + Types in the range 0 - 16383 are intended for reporting errors. An + implementation receiving a Notify payload with one of these types + that it does not recognize in a response MUST assume that the + corresponding request has failed entirely. {{ Demoted the SHOULD }} + Unrecognized error types in a request and status types in a request + or response MUST be ignored, and they should be logged. + + Notify payloads with status types MAY be added to any message and + MUST be ignored if not recognized. They are intended to indicate + capabilities, and as part of SA negotiation are used to negotiate + non-cryptographic parameters. + + NOTIFY messages: error types Value + ------------------------------------------------------------------- + + RESERVED 0 + + UNSUPPORTED_CRITICAL_PAYLOAD 1 + Sent if the payload has the "critical" bit set and the payload + type is not recognized. Notification Data contains the one-octet + payload type. + + INVALID_IKE_SPI 4 + Indicates an IKE message was received with an unrecognized + destination SPI. This usually indicates that the recipient has + rebooted and forgotten the existence of an IKE_SA. + + INVALID_MAJOR_VERSION 5 + Indicates the recipient cannot handle the version of IKE + specified in the header. The closest version number that the + recipient can support will be in the reply header. + + INVALID_SYNTAX 7 + Indicates the IKE message that was received was invalid because + some type, length, or value was out of range or because the + request was rejected for policy reasons. To avoid a denial of + service attack using forged messages, this status may only be + returned for and in an encrypted packet if the message ID and + cryptographic checksum were valid. To avoid leaking information + to someone probing a node, this status MUST be sent in response + to any error not covered by one of the other status types. + {{ Demoted the SHOULD }} To aid debugging, more detailed error + + + +Kaufman, et al. Expires August 27, 2006 [Page 79] + +Internet-Draft IKEv2bis February 2006 + + + information should be written to a console or log. + + INVALID_MESSAGE_ID 9 + Sent when an IKE message ID outside the supported window is + received. This Notify MUST NOT be sent in a response; the invalid + request MUST NOT be acknowledged. Instead, inform the other side + by initiating an INFORMATIONAL exchange with Notification data + containing the four octet invalid message ID. Sending this + notification is optional, and notifications of this type MUST be + rate limited. + + INVALID_SPI 11 + MAY be sent in an IKE INFORMATIONAL exchange when a node receives + an ESP or AH packet with an invalid SPI. The Notification Data + contains the SPI of the invalid packet. This usually indicates a + node has rebooted and forgotten an SA. If this Informational + Message is sent outside the context of an IKE_SA, it should only + be used by the recipient as a "hint" that something might be + wrong (because it could easily be forged). + + NO_PROPOSAL_CHOSEN 14 + None of the proposed crypto suites was acceptable. + + INVALID_KE_PAYLOAD 17 + The D-H Group # field in the KE payload is not the group # + selected by the responder for this exchange. There are two octets + of data associated with this notification: the accepted D-H Group + # in big endian order. + + AUTHENTICATION_FAILED 24 + Sent in the response to an IKE_AUTH message when for some reason + the authentication failed. There is no associated data. + + SINGLE_PAIR_REQUIRED 34 + This error indicates that a CREATE_CHILD_SA request is + unacceptable because its sender is only willing to accept traffic + selectors specifying a single pair of addresses. The requestor is + expected to respond by requesting an SA for only the specific + traffic it is trying to forward. + + NO_ADDITIONAL_SAS 35 + This error indicates that a CREATE_CHILD_SA request is + unacceptable because the responder is unwilling to accept any + more CHILD_SAs on this IKE_SA. Some minimal implementations may + only accept a single CHILD_SA setup in the context of an initial + IKE exchange and reject any subsequent attempts to add more. + + INTERNAL_ADDRESS_FAILURE 36 + + + +Kaufman, et al. Expires August 27, 2006 [Page 80] + +Internet-Draft IKEv2bis February 2006 + + + Indicates an error assigning an internal address (i.e., + INTERNAL_IP4_ADDRESS or INTERNAL_IP6_ADDRESS) during the + processing of a Configuration Payload by a responder. If this + error is generated within an IKE_AUTH exchange, no CHILD_SA will + be created. + + FAILED_CP_REQUIRED 37 + Sent by responder in the case where CP(CFG_REQUEST) was expected + but not received, and so is a conflict with locally configured + policy. There is no associated data. + + TS_UNACCEPTABLE 38 + Indicates that none of the addresses/protocols/ports in the + supplied traffic selectors is acceptable. + + INVALID_SELECTORS 39 + MAY be sent in an IKE INFORMATIONAL exchange when a node receives + an ESP or AH packet whose selectors do not match those of the SA + on which it was delivered (and that caused the packet to be + dropped). The Notification Data contains the start of the + offending packet (as in ICMP messages) and the SPI field of the + notification is set to match the SPI of the IPsec SA. + + RESERVED TO IANA 40-8191 + + PRIVATE USE 8192-16383 + + + NOTIFY messages: status types Value + ------------------------------------------------------------------- + + INITIAL_CONTACT 16384 + This notification asserts that this IKE_SA is the only IKE_SA + currently active between the authenticated identities. It MAY be + sent when an IKE_SA is established after a crash, and the + recipient MAY use this information to delete any other IKE_SAs it + has to the same authenticated identity without waiting for a + timeout. This notification MUST NOT be sent by an entity that may + be replicated (e.g., a roaming user's credentials where the user + is allowed to connect to the corporate firewall from two remote + systems at the same time). {{ Clarif-7.9 }} The INITIAL_CONTACT + notification, if sent, SHOULD be in the first IKE_AUTH request, + not as a separate exchange afterwards; however, receiving + parties need to deal with it in other requests. + + SET_WINDOW_SIZE 16385 + This notification asserts that the sending endpoint is capable of + keeping state for multiple outstanding exchanges, permitting the + + + +Kaufman, et al. Expires August 27, 2006 [Page 81] + +Internet-Draft IKEv2bis February 2006 + + + recipient to send multiple requests before getting a response to + the first. The data associated with a SET_WINDOW_SIZE + notification MUST be 4 octets long and contain the big endian + representation of the number of messages the sender promises to + keep. Window size is always one until the initial exchanges + complete. + + ADDITIONAL_TS_POSSIBLE 16386 + This notification asserts that the sending endpoint narrowed the + proposed traffic selectors but that other traffic selectors would + also have been acceptable, though only in a separate SA (see + section 2.9). There is no data associated with this Notify type. + It may be sent only as an additional payload in a message + including accepted TSs. + + IPCOMP_SUPPORTED 16387 + This notification may be included only in a message containing an + SA payload negotiating a CHILD_SA and indicates a willingness by + its sender to use IPComp on this SA. The data associated with + this notification includes a two-octet IPComp CPI followed by a + one-octet transform ID optionally followed by attributes whose + length and format are defined by that transform ID. A message + proposing an SA may contain multiple IPCOMP_SUPPORTED + notifications to indicate multiple supported algorithms. A + message accepting an SA may contain at most one. + + The transform IDs currently defined are: + + Name Number Defined In + ------------------------------------- + RESERVED 0 + IPCOMP_OUI 1 + IPCOMP_DEFLATE 2 RFC 2394 + IPCOMP_LZS 3 RFC 2395 + IPCOMP_LZJH 4 RFC 3051 + RESERVED TO IANA 5-240 + PRIVATE USE 241-255 + + NAT_DETECTION_SOURCE_IP 16388 + This notification is used by its recipient to determine whether + the source is behind a NAT box. The data associated with this + notification is a SHA-1 digest of the SPIs (in the order they + appear in the header), IP address, and port on which this packet + was sent. There MAY be multiple Notify payloads of this type in a + message if the sender does not know which of several network + attachments will be used to send the packet. The recipient of + this notification MAY compare the supplied value to a SHA-1 hash + of the SPIs, source IP address, and port, and if they don't match + + + +Kaufman, et al. Expires August 27, 2006 [Page 82] + +Internet-Draft IKEv2bis February 2006 + + + it SHOULD enable NAT traversal (see section 2.23). Alternately, + it MAY reject the connection attempt if NAT traversal is not + supported. + + NAT_DETECTION_DESTINATION_IP 16389 + This notification is used by its recipient to determine whether + it is behind a NAT box. The data associated with this + notification is a SHA-1 digest of the SPIs (in the order they + appear in the header), IP address, and port to which this packet + was sent. The recipient of this notification MAY compare the + supplied value to a hash of the SPIs, destination IP address, and + port, and if they don't match it SHOULD invoke NAT traversal (see + section 2.23). If they don't match, it means that this end is + behind a NAT and this end SHOULD start sending keepalive packets + as defined in [UDPENCAPS]. Alternately, it MAY reject the + connection attempt if NAT traversal is not supported. + + COOKIE 16390 + This notification MAY be included in an IKE_SA_INIT response. It + indicates that the request should be retried with a copy of this + notification as the first payload. This notification MUST be + included in an IKE_SA_INIT request retry if a COOKIE notification + was included in the initial response. The data associated with + this notification MUST be between 1 and 64 octets in length + (inclusive). + + USE_TRANSPORT_MODE 16391 + This notification MAY be included in a request message that also + includes an SA payload requesting a CHILD_SA. It requests that + the CHILD_SA use transport mode rather than tunnel mode for the + SA created. If the request is accepted, the response MUST also + include a notification of type USE_TRANSPORT_MODE. If the + responder declines the request, the CHILD_SA will be established + in tunnel mode. If this is unacceptable to the initiator, the + initiator MUST delete the SA. Note: Except when using this option + to negotiate transport mode, all CHILD_SAs will use tunnel mode. + + Note: The ECN decapsulation modifications specified in + [IPSECARCH] MUST be performed for every tunnel mode SA created + by IKEv2. + + HTTP_CERT_LOOKUP_SUPPORTED 16392 + This notification MAY be included in any message that can include + a CERTREQ payload and indicates that the sender is capable of + looking up certificates based on an HTTP-based URL (and hence + presumably would prefer to receive certificate specifications in + that format). + + + + +Kaufman, et al. Expires August 27, 2006 [Page 83] + +Internet-Draft IKEv2bis February 2006 + + + REKEY_SA 16393 + This notification MUST be included in a CREATE_CHILD_SA exchange + if the purpose of the exchange is to replace an existing ESP or + AH SA. The SPI field identifies the SA being rekeyed. + {{ Clarif-5.4 }} The SPI placed in the REKEY_SA + notification is the SPI the exchange initiator would expect in + inbound ESP or AH packets. There is no data. + + ESP_TFC_PADDING_NOT_SUPPORTED 16394 + This notification asserts that the sending endpoint will NOT + accept packets that contain Flow Confidentiality (TFC) padding. + {{ Clarif-4.5 }} The scope of this message is a single + CHILD_SA, and thus this notification is included in messages + containing an SA payload negotiating a CHILD_SA. If neither + endpoint accepts TFC padding, this notification SHOULD be + included in both the request proposing an SA and the response + accepting it. If this notification is included in only one of + the messages, TFC padding can still be sent in the other + direction. + + NON_FIRST_FRAGMENTS_ALSO 16395 + Used for fragmentation control. See [IPSECARCH] for explanation. + {{ Clarif-4.6 }} Sending non-first fragments is + enabled only if NON_FIRST_FRAGMENTS_ALSO notification is + included in both the request proposing an SA and the response + accepting it. If the peer rejects this proposal, the peer only + omits NON_FIRST_FRAGMENTS_ALSO notification from the response, + but does not reject the whole CHILD_SA creation. + + RESERVED TO IANA 16396-40959 + + PRIVATE USE 40960-65535 + +3.11. Delete Payload + + The Delete Payload, denoted D in this memo, contains a protocol + specific security association identifier that the sender has removed + from its security association database and is, therefore, no longer + valid. Figure 17 shows the format of the Delete Payload. It is + possible to send multiple SPIs in a Delete payload; however, each SPI + MUST be for the same protocol. Mixing of protocol identifiers MUST + NOT be performed in the Delete payload. It is permitted, however, to + include multiple Delete payloads in a single INFORMATIONAL exchange + where each Delete payload lists SPIs for a different protocol. + + Deletion of the IKE_SA is indicated by a protocol ID of 1 (IKE) but + no SPIs. Deletion of a CHILD_SA, such as ESP or AH, will contain the + IPsec protocol ID of that protocol (2 for AH, 3 for ESP), and the SPI + + + +Kaufman, et al. Expires August 27, 2006 [Page 84] + +Internet-Draft IKEv2bis February 2006 + + + is the SPI the sending endpoint would expect in inbound ESP or AH + packets. + + The Delete Payload is defined as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Protocol ID ! SPI Size ! # of SPIs ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Security Parameter Index(es) (SPI) ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 17: Delete Payload Format + + o Protocol ID (1 octet) - Must be 1 for an IKE_SA, 2 for AH, or 3 + for ESP. + + o SPI Size (1 octet) - Length in octets of the SPI as defined by the + protocol ID. It MUST be zero for IKE (SPI is in message header) + or four for AH and ESP. + + o # of SPIs (2 octets) - The number of SPIs contained in the Delete + payload. The size of each SPI is defined by the SPI Size field. + + o Security Parameter Index(es) (variable length) - Identifies the + specific security association(s) to delete. The length of this + field is determined by the SPI Size and # of SPIs fields. + + The payload type for the Delete Payload is forty two (42). + +3.12. Vendor ID Payload + + The Vendor ID Payload, denoted V in this memo, contains a vendor + defined constant. The constant is used by vendors to identify and + recognize remote instances of their implementations. This mechanism + allows a vendor to experiment with new features while maintaining + backward compatibility. + + A Vendor ID payload MAY announce that the sender is capable to + accepting certain extensions to the protocol, or it MAY simply + identify the implementation as an aid in debugging. A Vendor ID + payload MUST NOT change the interpretation of any information defined + in this specification (i.e., the critical bit MUST be set to 0). + + + +Kaufman, et al. Expires August 27, 2006 [Page 85] + +Internet-Draft IKEv2bis February 2006 + + + Multiple Vendor ID payloads MAY be sent. An implementation is NOT + REQUIRED to send any Vendor ID payload at all. + + A Vendor ID payload may be sent as part of any message. Reception of + a familiar Vendor ID payload allows an implementation to make use of + Private USE numbers described throughout this memo-- private + payloads, private exchanges, private notifications, etc. Unfamiliar + Vendor IDs MUST be ignored. + + Writers of Internet-Drafts who wish to extend this protocol MUST + define a Vendor ID payload to announce the ability to implement the + extension in the Internet-Draft. It is expected that Internet-Drafts + that gain acceptance and are standardized will be given "magic + numbers" out of the Future Use range by IANA, and the requirement to + use a Vendor ID will go away. + + The Vendor ID Payload fields are defined as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Vendor ID (VID) ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 18: Vendor ID Payload Format + + o Vendor ID (variable length) - It is the responsibility of the + person choosing the Vendor ID to assure its uniqueness in spite of + the absence of any central registry for IDs. Good practice is to + include a company name, a person name, or some such. If you want + to show off, you might include the latitude and longitude and time + where you were when you chose the ID and some random input. A + message digest of a long unique string is preferable to the long + unique string itself. + + The payload type for the Vendor ID Payload is forty three (43). + +3.13. Traffic Selector Payload + + The Traffic Selector Payload, denoted TS in this memo, allows peers + to identify packet flows for processing by IPsec security services. + The Traffic Selector Payload consists of the IKE generic payload + header followed by individual traffic selectors as follows: + + + + +Kaufman, et al. Expires August 27, 2006 [Page 86] + +Internet-Draft IKEv2bis February 2006 + + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Number of TSs ! RESERVED ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ <Traffic Selectors> ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 19: Traffic Selectors Payload Format + + o Number of TSs (1 octet) - Number of traffic selectors being + provided. + + o RESERVED - This field MUST be sent as zero and MUST be ignored on + receipt. + + o Traffic Selectors (variable length) - One or more individual + traffic selectors. + + The length of the Traffic Selector payload includes the TS header and + all the traffic selectors. + + The payload type for the Traffic Selector payload is forty four (44) + for addresses at the initiator's end of the SA and forty five (45) + for addresses at the responder's end. + + {{ Clarif-4.7 }} There is no requirement that TSi and TSr contain the + same number of individual traffic selectors. Thus, they are + interpreted as follows: a packet matches a given TSi/TSr if it + matches at least one of the individual selectors in TSi, and at least + one of the individual selectors in TSr. + + For instance, the following traffic selectors: + + TSi = ((17, 100, 192.0.1.66-192.0.1.66), + (17, 200, 192.0.1.66-192.0.1.66)) + TSr = ((17, 300, 0.0.0.0-255.255.255.255), + (17, 400, 0.0.0.0-255.255.255.255)) + + would match UDP packets from 192.0.1.66 to anywhere, with any of the + four combinations of source/destination ports (100,300), (100,400), + (200,300), and (200, 400). + + Thus, some types of policies may require several CHILD_SA pairs. For + + + +Kaufman, et al. Expires August 27, 2006 [Page 87] + +Internet-Draft IKEv2bis February 2006 + + + instance, a policy matching only source/destination ports (100,300) + and (200,400), but not the other two combinations, cannot be + negotiated as a single CHILD_SA pair. + +3.13.1. Traffic Selector + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! TS Type !IP Protocol ID*| Selector Length | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Start Port* | End Port* | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Starting Address* ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Ending Address* ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 20: Traffic Selector + + *Note: All fields other than TS Type and Selector Length depend on + the TS Type. The fields shown are for TS Types 7 and 8, the only two + values currently defined. + + o TS Type (one octet) - Specifies the type of traffic selector. + + o IP protocol ID (1 octet) - Value specifying an associated IP + protocol ID (e.g., UDP/TCP/ICMP). A value of zero means that the + protocol ID is not relevant to this traffic selector-- the SA can + carry all protocols. + + o Selector Length - Specifies the length of this Traffic Selector + Substructure including the header. + + o Start Port (2 octets) - Value specifying the smallest port number + allowed by this Traffic Selector. For protocols for which port is + undefined, or if all ports are allowed, this field MUST be zero. + For the ICMP protocol, the two one-octet fields Type and Code are + treated as a single 16-bit integer (with Type in the most + significant eight bits and Code in the least significant eight + bits) port number for the purposes of filtering based on this + field. + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 88] + +Internet-Draft IKEv2bis February 2006 + + + o End Port (2 octets) - Value specifying the largest port number + allowed by this Traffic Selector. For protocols for which port is + undefined, or if all ports are allowed, this field MUST be 65535. + For the ICMP protocol, the two one-octet fields Type and Code are + treated as a single 16-bit integer (with Type in the most + significant eight bits and Code in the least significant eight + bits) port number for the purposed of filtering based on this + field. + + o Starting Address - The smallest address included in this Traffic + Selector (length determined by TS type). + + o Ending Address - The largest address included in this Traffic + Selector (length determined by TS type). + + Systems that are complying with [IPSECARCH] that wish to indicate + "ANY" ports MUST set the start port to 0 and the end port to 65535; + note that according to [IPSECARCH], "ANY" includes "OPAQUE". Systems + working with [IPSECARCH] that wish to indicate "OPAQUE" ports, but + not "ANY" ports, MUST set the start port to 65535 and the end port to + 0. + + {{ Added from Clarif-4.8 }} The traffic selector types 7 and 8 can + also refer to ICMP type and code fields. Note, however, that ICMP + packets do not have separate source and destination port fields. The + method for specifying the traffic selectors for ICMP is shown by + example in Section 4.4.1.3 of [IPSECARCH]. + + {{ Added from Clarif-4.9 }} Traffic selectors can use IP Protocol ID + 135 to match the IPv6 mobility header [MIPV6]. This document does + not specify how to represent the "MH Type" field in traffic + selectors, although it is likely that a different document will + specify this in the future. Note that [IPSECARCH] says that the IPv6 + mobility header (MH) message type is placed in the most significant + eight bits of the 16-bit local port selector. The direction + semantics of TSi/TSr port fields are the same as for ICMP. + + The following table lists the assigned values for the Traffic + Selector Type field and the corresponding Address Selector Data. + + + + + + + + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 89] + +Internet-Draft IKEv2bis February 2006 + + + TS Type Value + ------------------------------------------------------------------- + RESERVED 0-6 + + TS_IPV4_ADDR_RANGE 7 + + A range of IPv4 addresses, represented by two four-octet + values. The first value is the beginning IPv4 address + (inclusive) and the second value is the ending IPv4 address + (inclusive). All addresses falling between the two specified + addresses are considered to be within the list. + + TS_IPV6_ADDR_RANGE 8 + + A range of IPv6 addresses, represented by two sixteen-octet + values. The first value is the beginning IPv6 address + (inclusive) and the second value is the ending IPv6 address + (inclusive). All addresses falling between the two specified + addresses are considered to be within the list. + + RESERVED TO IANA 9-240 + PRIVATE USE 241-255 + +3.14. Encrypted Payload + + The Encrypted Payload, denoted SK{...} or E in this memo, contains + other payloads in encrypted form. The Encrypted Payload, if present + in a message, MUST be the last payload in the message. Often, it is + the only payload in the message. + + The algorithms for encryption and integrity protection are negotiated + during IKE_SA setup, and the keys are computed as specified in + Section 2.14 and Section 2.18. + + The encryption and integrity protection algorithms are modeled after + the ESP algorithms described in RFCs 2104 [HMAC], 4303 [ESP], and + 2451 [ESPCBC]. This document completely specifies the cryptographic + processing of IKE data, but those documents should be consulted for + design rationale. We require a block cipher with a fixed block size + and an integrity check algorithm that computes a fixed-length + checksum over a variable size message. + + The payload type for an Encrypted payload is forty six (46). The + Encrypted Payload consists of the IKE generic payload header followed + by individual fields as follows: + + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 90] + +Internet-Draft IKEv2bis February 2006 + + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Initialization Vector ! + ! (length is block size for encryption algorithm) ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ~ Encrypted IKE Payloads ~ + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! Padding (0-255 octets) ! + +-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+ + ! ! Pad Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ~ Integrity Checksum Data ~ + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 21: Encrypted Payload Format + + o Next Payload - The payload type of the first embedded payload. + Note that this is an exception in the standard header format, + since the Encrypted payload is the last payload in the message and + therefore the Next Payload field would normally be zero. But + because the content of this payload is embedded payloads and there + was no natural place to put the type of the first one, that type + is placed here. + + o Payload Length - Includes the lengths of the header, IV, Encrypted + IKE Payloads, Padding, Pad Length, and Integrity Checksum Data. + + o Initialization Vector - A randomly chosen value whose length is + equal to the block length of the underlying encryption algorithm. + Recipients MUST accept any value. Senders SHOULD either pick this + value pseudo-randomly and independently for each message or use + the final ciphertext block of the previous message sent. Senders + MUST NOT use the same value for each message, use a sequence of + values with low hamming distance (e.g., a sequence number), or use + ciphertext from a received message. + + o IKE Payloads are as specified earlier in this section. This field + is encrypted with the negotiated cipher. + + o Padding MAY contain any value chosen by the sender, and MUST have + a length that makes the combination of the Payloads, the Padding, + and the Pad Length to be a multiple of the encryption block size. + This field is encrypted with the negotiated cipher. + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 91] + +Internet-Draft IKEv2bis February 2006 + + + o Pad Length is the length of the Padding field. The sender SHOULD + set the Pad Length to the minimum value that makes the combination + of the Payloads, the Padding, and the Pad Length a multiple of the + block size, but the recipient MUST accept any length that results + in proper alignment. This field is encrypted with the negotiated + cipher. + + o Integrity Checksum Data is the cryptographic checksum of the + entire message starting with the Fixed IKE Header through the Pad + Length. The checksum MUST be computed over the encrypted message. + Its length is determined by the integrity algorithm negotiated. + +3.15. Configuration Payload + + The Configuration payload, denoted CP in this document, is used to + exchange configuration information between IKE peers. The exchange + is for an IRAC to request an internal IP address from an IRAS and to + exchange other information of the sort that one would acquire with + Dynamic Host Configuration Protocol (DHCP) if the IRAC were directly + connected to a LAN. + + Configuration payloads are of type CFG_REQUEST/CFG_REPLY or CFG_SET/ + CFG_ACK (see CFG Type in the payload description below). CFG_REQUEST + and CFG_SET payloads may optionally be added to any IKE request. The + IKE response MUST include either a corresponding CFG_REPLY or CFG_ACK + or a Notify payload with an error type indicating why the request + could not be honored. An exception is that a minimal implementation + MAY ignore all CFG_REQUEST and CFG_SET payloads, so a response + message without a corresponding CFG_REPLY or CFG_ACK MUST be accepted + as an indication that the request was not supported. + + "CFG_REQUEST/CFG_REPLY" allows an IKE endpoint to request information + from its peer. If an attribute in the CFG_REQUEST Configuration + Payload is not zero-length, it is taken as a suggestion for that + attribute. The CFG_REPLY Configuration Payload MAY return that + value, or a new one. It MAY also add new attributes and not include + some requested ones. Requestors MUST ignore returned attributes that + they do not recognize. + + Some attributes MAY be multi-valued, in which case multiple attribute + values of the same type are sent and/or returned. Generally, all + values of an attribute are returned when the attribute is requested. + For some attributes (in this version of the specification only + internal addresses), multiple requests indicates a request that + multiple values be assigned. For these attributes, the number of + values returned SHOULD NOT exceed the number requested. + + If the data type requested in a CFG_REQUEST is not recognized or not + + + +Kaufman, et al. Expires August 27, 2006 [Page 92] + +Internet-Draft IKEv2bis February 2006 + + + supported, the responder MUST NOT return an error type but rather + MUST either send a CFG_REPLY that MAY be empty or a reply not + containing a CFG_REPLY payload at all. Error returns are reserved + for cases where the request is recognized but cannot be performed as + requested or the request is badly formatted. + + "CFG_SET/CFG_ACK" allows an IKE endpoint to push configuration data + to its peer. In this case, the CFG_SET Configuration Payload + contains attributes the initiator wants its peer to alter. The + responder MUST return a Configuration Payload if it accepted any of + the configuration data and it MUST contain the attributes that the + responder accepted with zero-length data. Those attributes that it + did not accept MUST NOT be in the CFG_ACK Configuration Payload. If + no attributes were accepted, the responder MUST return either an + empty CFG_ACK payload or a response message without a CFG_ACK + payload. There are currently no defined uses for the CFG_SET/CFG_ACK + exchange, though they may be used in connection with extensions based + on Vendor IDs. An minimal implementation of this specification MAY + ignore CFG_SET payloads. + + {{ Demoted the SHOULD }} Extensions via the CP payload should not be + used for general purpose management. Its main intent is to provide a + bootstrap mechanism to exchange information within IPsec from IRAS to + IRAC. While it MAY be useful to use such a method to exchange + information between some Security Gateways (SGW) or small networks, + existing management protocols such as DHCP [DHCP], RADIUS [RADIUS], + SNMP, or LDAP [LDAP] should be preferred for enterprise management as + well as subsequent information exchanges. + + The Configuration Payload is defined as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! CFG Type ! RESERVED ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Configuration Attributes ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 22: Configuration Payload Format + + The payload type for the Configuration Payload is forty seven (47). + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 93] + +Internet-Draft IKEv2bis February 2006 + + + o CFG Type (1 octet) - The type of exchange represented by the + Configuration Attributes. + + CFG Type Value + -------------------------- + RESERVED 0 + CFG_REQUEST 1 + CFG_REPLY 2 + CFG_SET 3 + CFG_ACK 4 + RESERVED TO IANA 5-127 + PRIVATE USE 128-255 + + o RESERVED (3 octets) - MUST be sent as zero; MUST be ignored on + receipt. + + o Configuration Attributes (variable length) - These are type length + values specific to the Configuration Payload and are defined + below. There may be zero or more Configuration Attributes in this + payload. + +3.15.1. Configuration Attributes + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + !R| Attribute Type ! Length | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + ~ Value ~ + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 23: Configuration Attribute Format + + o Reserved (1 bit) - This bit MUST be set to zero and MUST be + ignored on receipt. + + o Attribute Type (15 bits) - A unique identifier for each of the + Configuration Attribute Types. + + o Length (2 octets) - Length in octets of Value. + + o Value (0 or more octets) - The variable-length value of this + Configuration Attribute. The following attribute types have been + defined: + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 94] + +Internet-Draft IKEv2bis February 2006 + + + Multi- + Attribute Type Value Valued Length + ------------------------------------------------------- + RESERVED 0 + INTERNAL_IP4_ADDRESS 1 YES* 0 or 4 octets + INTERNAL_IP4_NETMASK 2 NO 0 or 4 octets + INTERNAL_IP4_DNS 3 YES 0 or 4 octets + INTERNAL_IP4_NBNS 4 YES 0 or 4 octets + INTERNAL_ADDRESS_EXPIRY 5 NO 0 or 4 octets + INTERNAL_IP4_DHCP 6 YES 0 or 4 octets + APPLICATION_VERSION 7 NO 0 or more + INTERNAL_IP6_ADDRESS 8 YES* 0 or 17 octets + RESERVED 9 + INTERNAL_IP6_DNS 10 YES 0 or 16 octets + INTERNAL_IP6_NBNS 11 YES 0 or 16 octets + INTERNAL_IP6_DHCP 12 YES 0 or 16 octets + INTERNAL_IP4_SUBNET 13 YES 0 or 8 octets + SUPPORTED_ATTRIBUTES 14 NO Multiple of 2 + INTERNAL_IP6_SUBNET 15 YES 17 octets + RESERVED TO IANA 16-16383 + PRIVATE USE 16384-32767 + + * These attributes may be multi-valued on return only if + multiple values were requested. + + o INTERNAL_IP4_ADDRESS, INTERNAL_IP6_ADDRESS - An address on the + internal network, sometimes called a red node address or private + address and MAY be a private address on the Internet. {{ + Clarif-6.2}} In a request message, the address specified is a + requested address (or a zero-length address if no specific address + is requested). If a specific address is requested, it likely + indicates that a previous connection existed with this address and + the requestor would like to reuse that address. With IPv6, a + requestor MAY supply the low-order address bytes it wants to use. + Multiple internal addresses MAY be requested by requesting + multiple internal address attributes. The responder MAY only send + up to the number of addresses requested. The INTERNAL_IP6_ADDRESS + is made up of two fields: the first is a 16-octet IPv6 address, + and the second is a one-octet prefix-length as defined in + [ADDRIPV6]. + + The requested address is valid until the expiry time defined with + the INTERNAL_ADDRESS_EXPIRY attribute or there are no IKE_SAs + between the peers. + + o INTERNAL_IP4_NETMASK - The internal network's netmask. Only one + netmask is allowed in the request and reply messages (e.g., + 255.255.255.0), and it MUST be used only with an + + + +Kaufman, et al. Expires August 27, 2006 [Page 95] + +Internet-Draft IKEv2bis February 2006 + + + INTERNAL_IP4_ADDRESS attribute. {{ Clarif-6.4 }} + INTERNAL_IP4_NETMASK in a CFG_REPLY means roughly the same thing + as INTERNAL_IP4_SUBNET containing the same information ("send + traffic to these addresses through me"), but also implies a link + boundary. For instance, the client could use its own address and + the netmask to calculate the broadcast address of the link. An + empty INTERNAL_IP4_NETMASK attribute can be included in a + CFG_REQUEST to request this information (although the gateway can + send the information even when not requested). Non-empty values + for this attribute in a CFG_REQUEST do not make sense and thus + MUST NOT be included. + + o INTERNAL_IP4_DNS, INTERNAL_IP6_DNS - Specifies an address of a DNS + server within the network. Multiple DNS servers MAY be requested. + The responder MAY respond with zero or more DNS server attributes. + + o INTERNAL_IP4_NBNS, INTERNAL_IP6_NBNS - Specifies an address of a + NetBios Name Server (WINS) within the network. Multiple NBNS + servers MAY be requested. The responder MAY respond with zero or + more NBNS server attributes. {{ Clarif-6.6 }} NetBIOS is not + defined for IPv6; therefore, INTERNAL_IP6_NBNS SHOULD NOT be used. + + o INTERNAL_ADDRESS_EXPIRY - Specifies the number of seconds that the + host can use the internal IP address. The host MUST renew the IP + address before this expiry time. Only one of these attributes MAY + be present in the reply. {{ Clarif-6.7 }} Expiry times and + explicit renewals are primarily useful in environments like DHCP, + where the server cannot reliably know when the client has gone + away. However, in IKEv2, this is known, and the gateway can + simply free the address when the IKE_SA is deleted. Further, + supporting renewals is not mandatory. Thus + INTERNAL_ADDRESS_EXPIRY attribute MUST NOT be used. + + o INTERNAL_IP4_DHCP, INTERNAL_IP6_DHCP - Instructs the host to send + any internal DHCP requests to the address contained within the + attribute. Multiple DHCP servers MAY be requested. The responder + MAY respond with zero or more DHCP server attributes. + + o APPLICATION_VERSION - The version or application information of + the IPsec host. This is a string of printable ASCII characters + that is NOT null terminated. + + o INTERNAL_IP4_SUBNET - The protected sub-networks that this edge- + device protects. This attribute is made up of two fields: the + first being an IP address and the second being a netmask. + Multiple sub-networks MAY be requested. The responder MAY respond + with zero or more sub-network attributes. + + + + +Kaufman, et al. Expires August 27, 2006 [Page 96] + +Internet-Draft IKEv2bis February 2006 + + + o SUPPORTED_ATTRIBUTES - When used within a Request, this attribute + MUST be zero-length and specifies a query to the responder to + reply back with all of the attributes that it supports. The + response contains an attribute that contains a set of attribute + identifiers each in 2 octets. The length divided by 2 (octets) + would state the number of supported attributes contained in the + response. + + o INTERNAL_IP6_SUBNET - The protected sub-networks that this edge- + device protects. This attribute is made up of two fields: the + first is a 16-octet IPv6 address, and the second is a one-octet + prefix-length as defined in [ADDRIPV6]. Multiple sub-networks MAY + be requested. The responder MAY respond with zero or more sub- + network attributes. + + Note that no recommendations are made in this document as to how an + implementation actually figures out what information to send in a + reply. That is, we do not recommend any specific method of an IRAS + determining which DNS server should be returned to a requesting IRAC. + +3.15.2. Meaning of INTERNAL_IP4_SUBNET/INTERNAL_IP6_SUBNET + + {{ Section added based on Clarif-6.3 }} + + INTERNAL_IP4/6_SUBNET attributes can indicate additional subnets, + ones that need one or more separate SAs, that can be reached through + the gateway that announces the attributes. INTERNAL_IP4/6_SUBNET + attributes may also express the gateway's policy about what traffic + should be sent through the gateway; the client can choose whether + other traffic (covered by TSr, but not in INTERNAL_IP4/6_SUBNET) is + sent through the gateway or directly to the destination. Thus, + traffic to the addresses listed in the INTERNAL_IP4/6_SUBNET + attributes should be sent through the gateway that announces the + attributes. If there are no existing IPsec SAs whose traffic + selectors cover the address in question, new SAs need to be created. + + For instance, if there are two subnets, 192.0.1.0/26 and + 192.0.2.0/24, and the client's request contains the following: + + CP(CFG_REQUEST) = + INTERNAL_IP4_ADDRESS() + TSi = (0, 0-65535, 0.0.0.0-255.255.255.255) + TSr = (0, 0-65535, 0.0.0.0-255.255.255.255) + + then a valid response could be the following (in which TSr and + INTERNAL_IP4_SUBNET contain the same information): + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 97] + +Internet-Draft IKEv2bis February 2006 + + + CP(CFG_REPLY) = + INTERNAL_IP4_ADDRESS(192.0.1.234) + INTERNAL_IP4_SUBNET(192.0.1.0/255.255.255.192) + INTERNAL_IP4_SUBNET(192.0.2.0/255.255.255.0) + TSi = (0, 0-65535, 192.0.1.234-192.0.1.234) + TSr = ((0, 0-65535, 192.0.1.0-192.0.1.63), + (0, 0-65535, 192.0.2.0-192.0.2.255)) + + In these cases, the INTERNAL_IP4_SUBNET does not really carry any + useful information. + + A different possible reply would have been this: + + CP(CFG_REPLY) = + INTERNAL_IP4_ADDRESS(192.0.1.234) + INTERNAL_IP4_SUBNET(192.0.1.0/255.255.255.192) + INTERNAL_IP4_SUBNET(192.0.2.0/255.255.255.0) + TSi = (0, 0-65535, 192.0.1.234-192.0.1.234) + TSr = (0, 0-65535, 0.0.0.0-255.255.255.255) + + That reply would mean that the client can send all its traffic + through the gateway, but the gateway does not mind if the client + sends traffic not included by INTERNAL_IP4_SUBNET directly to the + destination (without going through the gateway). + + A different situation arises if the gateway has a policy that + requires the traffic for the two subnets to be carried in separate + SAs. Then a response like this would indicate to the client that if + it wants access to the second subnet, it needs to create a separate + SA: + + CP(CFG_REPLY) = + INTERNAL_IP4_ADDRESS(192.0.1.234) + INTERNAL_IP4_SUBNET(192.0.1.0/255.255.255.192) + INTERNAL_IP4_SUBNET(192.0.2.0/255.255.255.0) + TSi = (0, 0-65535, 192.0.1.234-192.0.1.234) + TSr = (0, 0-65535, 192.0.1.0-192.0.1.63) + + INTERNAL_IP4_SUBNET can also be useful if the client's TSr included + only part of the address space. For instance, if the client requests + the following: + + CP(CFG_REQUEST) = + INTERNAL_IP4_ADDRESS() + TSi = (0, 0-65535, 0.0.0.0-255.255.255.255) + TSr = (0, 0-65535, 192.0.2.155-192.0.2.155) + + then the gateway's reply might be: + + + +Kaufman, et al. Expires August 27, 2006 [Page 98] + +Internet-Draft IKEv2bis February 2006 + + + CP(CFG_REPLY) = + INTERNAL_IP4_ADDRESS(192.0.1.234) + INTERNAL_IP4_SUBNET(192.0.1.0/255.255.255.192) + INTERNAL_IP4_SUBNET(192.0.2.0/255.255.255.0) + TSi = (0, 0-65535, 192.0.1.234-192.0.1.234) + TSr = (0, 0-65535, 192.0.2.155-192.0.2.155) + + Because the meaning of INTERNAL_IP4_SUBNET/INTERNAL_IP6_SUBNET is in + CFG_REQUESTs is unclear, they cannot be used reliably in + CFG_REQUESTs. + +3.15.3. Configuration payloads for IPv6 + + {{ Added this section from Clarif-6.5 }} + + The configuration payloads for IPv6 are based on the corresponding + IPv4 payloads, and do not fully follow the "normal IPv6 way of doing + things". In particular, IPv6 stateless autoconfiguration or router + advertisement messages are not used; neither is neighbor discovery. + + A client can be assigned an IPv6 address using the + INTERNAL_IP6_ADDRESS configuration payload. A minimal exchange might + look like this: + + CP(CFG_REQUEST) = + INTERNAL_IP6_ADDRESS() + INTERNAL_IP6_DNS() + TSi = (0, 0-65535, :: - FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF) + TSr = (0, 0-65535, :: - FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF) + + CP(CFG_REPLY) = + INTERNAL_IP6_ADDRESS(2001:DB8:0:1:2:3:4:5/64) + INTERNAL_IP6_DNS(2001:DB8:99:88:77:66:55:44) + TSi = (0, 0-65535, 2001:DB8:0:1:2:3:4:5 - 2001:DB8:0:1:2:3:4:5) + TSr = (0, 0-65535, :: - FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF) + + The client MAY send a non-empty INTERNAL_IP6_ADDRESS attribute in the + CFG_REQUEST to request a specific address or interface identifier. + The gateway first checks if the specified address is acceptable, and + if it is, returns that one. If the address was not acceptable, the + gateway attempts to use the interface identifier with some other + prefix; if even that fails, the gateway selects another interface + identifier. + + The INTERNAL_IP6_ADDRESS attribute also contains a prefix length + field. When used in a CFG_REPLY, this corresponds to the + INTERNAL_IP4_NETMASK attribute in the IPv4 case. + + + + +Kaufman, et al. Expires August 27, 2006 [Page 99] + +Internet-Draft IKEv2bis February 2006 + + + Although this approach to configuring IPv6 addresses is reasonably + simple, it has some limitations. IPsec tunnels configured using + IKEv2 are not fully-featured "interfaces" in the IPv6 addressing + architecture sense [IPV6ADDR]. In particular, they do not + necessarily have link-local addresses, and this may complicate the + use of protocols that assume them, such as [MLDV2]. + +3.15.4. Address Assignment Failures + + {{ Added this section from Clarif-6.8 }} + + If the responder encounters an error while attempting to assign an IP + address to the initiator, it responds with an + INTERNAL_ADDRESS_FAILURE notification. However, there are some more + complex error cases. + + If the responder does not support configuration payloads at all, it + can simply ignore all configuration payloads. This type of + implementation never sends INTERNAL_ADDRESS_FAILURE notifications. + If the initiator requires the assignment of an IP address, it will + treat a response without CFG_REPLY as an error. + + The initiator may request a particular type of address (IPv4 or IPv6) + that the responder does not support, even though the responder + supports configuration payloads. In this case, the responder simply + ignores the type of address it does not support and processes the + rest of the request as usual. + + If the initiator requests multiple addresses of a type that the + responder supports, and some (but not all) of the requests fail, the + responder replies with the successful addresses only. The responder + sends INTERNAL_ADDRESS_FAILURE only if no addresses can be assigned. + +3.16. Extensible Authentication Protocol (EAP) Payload + + The Extensible Authentication Protocol Payload, denoted EAP in this + memo, allows IKE_SAs to be authenticated using the protocol defined + in RFC 3748 [EAP] and subsequent extensions to that protocol. The + full set of acceptable values for the payload is defined elsewhere, + but a short summary of RFC 3748 is included here to make this + document stand alone in the common cases. + + + + + + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 100] + +Internet-Draft IKEv2bis February 2006 + + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ EAP Message ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 24: EAP Payload Format + + The payload type for an EAP Payload is forty eight (48). + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Code ! Identifier ! Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Type ! Type_Data... + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- + + Figure 25: EAP Message Format + + o Code (1 octet) indicates whether this message is a Request (1), + Response (2), Success (3), or Failure (4). + + o Identifier (1 octet) is used in PPP to distinguish replayed + messages from repeated ones. Since in IKE, EAP runs over a + reliable protocol, it serves no function here. In a response + message, this octet MUST be set to match the identifier in the + corresponding request. In other messages, this field MAY be set + to any value. + + o Length (2 octets) is the length of the EAP message and MUST be + four less than the Payload Length of the encapsulating payload. + + o Type (1 octet) is present only if the Code field is Request (1) or + Response (2). For other codes, the EAP message length MUST be + four octets and the Type and Type_Data fields MUST NOT be present. + In a Request (1) message, Type indicates the data being requested. + In a Response (2) message, Type MUST either be Nak or match the + type of the data requested. The following types are defined in + RFC 3748: + + + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 101] + +Internet-Draft IKEv2bis February 2006 + + + 1 Identity + 2 Notification + 3 Nak (Response Only) + 4 MD5-Challenge + 5 One-Time Password (OTP) + 6 Generic Token Card + + o Type_Data (Variable Length) varies with the Type of Request and + the associated Response. For the documentation of the EAP + methods, see [EAP]. + + {{ Demoted the SHOULD NOT and SHOULD }} Note that since IKE passes an + indication of initiator identity in message 3 of the protocol, the + responder should not send EAP Identity requests. The initiator may, + however, respond to such requests if it receives them. + + +4. Conformance Requirements + + In order to assure that all implementations of IKEv2 can + interoperate, there are "MUST support" requirements in addition to + those listed elsewhere. Of course, IKEv2 is a security protocol, and + one of its major functions is to allow only authorized parties to + successfully complete establishment of SAs. So a particular + implementation may be configured with any of a number of restrictions + concerning algorithms and trusted authorities that will prevent + universal interoperability. + + IKEv2 is designed to permit minimal implementations that can + interoperate with all compliant implementations. There are a series + of optional features that can easily be ignored by a particular + implementation if it does not support that feature. Those features + include: + + o Ability to negotiate SAs through a NAT and tunnel the resulting + ESP SA over UDP. + + o Ability to request (and respond to a request for) a temporary IP + address on the remote end of a tunnel. + + o Ability to support various types of legacy authentication. + + o Ability to support window sizes greater than one. + + o Ability to establish multiple ESP and/or AH SAs within a single + IKE_SA. + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 102] + +Internet-Draft IKEv2bis February 2006 + + + o Ability to rekey SAs. + + To assure interoperability, all implementations MUST be capable of + parsing all payload types (if only to skip over them) and to ignore + payload types that it does not support unless the critical bit is set + in the payload header. If the critical bit is set in an unsupported + payload header, all implementations MUST reject the messages + containing those payloads. + + Every implementation MUST be capable of doing four-message + IKE_SA_INIT and IKE_AUTH exchanges establishing two SAs (one for IKE, + one for ESP and/or AH). Implementations MAY be initiate-only or + respond-only if appropriate for their platform. Every implementation + MUST be capable of responding to an INFORMATIONAL exchange, but a + minimal implementation MAY respond to any INFORMATIONAL message with + an empty INFORMATIONAL reply (note that within the context of an + IKE_SA, an "empty" message consists of an IKE header followed by an + Encrypted payload with no payloads contained in it). A minimal + implementation MAY support the CREATE_CHILD_SA exchange only in so + far as to recognize requests and reject them with a Notify payload of + type NO_ADDITIONAL_SAS. A minimal implementation need not be able to + initiate CREATE_CHILD_SA or INFORMATIONAL exchanges. When an SA + expires (based on locally configured values of either lifetime or + octets passed), and implementation MAY either try to renew it with a + CREATE_CHILD_SA exchange or it MAY delete (close) the old SA and + create a new one. If the responder rejects the CREATE_CHILD_SA + request with a NO_ADDITIONAL_SAS notification, the implementation + MUST be capable of instead deleting the old SA and creating a new + one. + + Implementations are not required to support requesting temporary IP + addresses or responding to such requests. If an implementation does + support issuing such requests, it MUST include a CP payload in + message 3 containing at least a field of type INTERNAL_IP4_ADDRESS or + INTERNAL_IP6_ADDRESS. All other fields are optional. If an + implementation supports responding to such requests, it MUST parse + the CP payload of type CFG_REQUEST in message 3 and recognize a field + of type INTERNAL_IP4_ADDRESS or INTERNAL_IP6_ADDRESS. If it supports + leasing an address of the appropriate type, it MUST return a CP + payload of type CFG_REPLY containing an address of the requested + type. {{ Demoted the SHOULD }} The responder may include any other + related attributes. + + A minimal IPv4 responder implementation will ignore the contents of + the CP payload except to determine that it includes an + INTERNAL_IP4_ADDRESS attribute and will respond with the address and + other related attributes regardless of whether the initiator + requested them. + + + +Kaufman, et al. Expires August 27, 2006 [Page 103] + +Internet-Draft IKEv2bis February 2006 + + + A minimal IPv4 initiator will generate a CP payload containing only + an INTERNAL_IP4_ADDRESS attribute and will parse the response + ignoring attributes it does not know how to use. {{ Clarif-6.7 + removes the sentence about processing INTERNAL_ADDRESS_EXPIRY. }} + Minimal initiators need not be able to request lease renewals and + minimal responders need not respond to them. + + For an implementation to be called conforming to this specification, + it MUST be possible to configure it to accept the following: + + o PKIX Certificates containing and signed by RSA keys of size 1024 + or 2048 bits, where the ID passed is any of ID_KEY_ID, ID_FQDN, + ID_RFC822_ADDR, or ID_DER_ASN1_DN. + + o Shared key authentication where the ID passes is any of ID_KEY_ID, + ID_FQDN, or ID_RFC822_ADDR. + + o Authentication where the responder is authenticated using PKIX + Certificates and the initiator is authenticated using shared key + authentication. + + +5. Security Considerations + + While this protocol is designed to minimize disclosure of + configuration information to unauthenticated peers, some such + disclosure is unavoidable. One peer or the other must identify + itself first and prove its identity first. To avoid probing, the + initiator of an exchange is required to identify itself first, and + usually is required to authenticate itself first. The initiator can, + however, learn that the responder supports IKE and what cryptographic + protocols it supports. The responder (or someone impersonating the + responder) can probe the initiator not only for its identity, but + using CERTREQ payloads may be able to determine what certificates the + initiator is willing to use. + + Use of EAP authentication changes the probing possibilities somewhat. + When EAP authentication is used, the responder proves its identity + before the initiator does, so an initiator that knew the name of a + valid initiator could probe the responder for both its name and + certificates. + + Repeated rekeying using CREATE_CHILD_SA without additional Diffie- + Hellman exchanges leaves all SAs vulnerable to cryptanalysis of a + single key or overrun of either endpoint. Implementers should take + note of this fact and set a limit on CREATE_CHILD_SA exchanges + between exponentiations. This memo does not prescribe such a limit. + + + + +Kaufman, et al. Expires August 27, 2006 [Page 104] + +Internet-Draft IKEv2bis February 2006 + + + The strength of a key derived from a Diffie-Hellman exchange using + any of the groups defined here depends on the inherent strength of + the group, the size of the exponent used, and the entropy provided by + the random number generator used. Due to these inputs, it is + difficult to determine the strength of a key for any of the defined + groups. Diffie-Hellman group number two, when used with a strong + random number generator and an exponent no less than 200 bits, is + common for use with 3DES. Group five provides greater security than + group two. Group one is for historic purposes only and does not + provide sufficient strength except for use with DES, which is also + for historic use only. Implementations should make note of these + estimates when establishing policy and negotiating security + parameters. + + Note that these limitations are on the Diffie-Hellman groups + themselves. There is nothing in IKE that prohibits using stronger + groups nor is there anything that will dilute the strength obtained + from stronger groups (limited by the strength of the other algorithms + negotiated including the prf function). In fact, the extensible + framework of IKE encourages the definition of more groups; use of + elliptical curve groups may greatly increase strength using much + smaller numbers. + + It is assumed that all Diffie-Hellman exponents are erased from + memory after use. In particular, these exponents MUST NOT be derived + from long-lived secrets like the seed to a pseudo-random generator + that is not erased after use. + + The strength of all keys is limited by the size of the output of the + negotiated prf function. For this reason, a prf function whose + output is less than 128 bits (e.g., 3DES-CBC) MUST NOT be used with + this protocol. + + The security of this protocol is critically dependent on the + randomness of the randomly chosen parameters. These should be + generated by a strong random or properly seeded pseudo-random source + (see [RANDOMNESS]). Implementers should take care to ensure that use + of random numbers for both keys and nonces is engineered in a fashion + that does not undermine the security of the keys. + + For information on the rationale of many of the cryptographic design + choices in this protocol, see [SIGMA] and [SKEME]. Though the + security of negotiated CHILD_SAs does not depend on the strength of + the encryption and integrity protection negotiated in the IKE_SA, + implementations MUST NOT negotiate NONE as the IKE integrity + protection algorithm or ENCR_NULL as the IKE encryption algorithm. + + When using pre-shared keys, a critical consideration is how to assure + + + +Kaufman, et al. Expires August 27, 2006 [Page 105] + +Internet-Draft IKEv2bis February 2006 + + + the randomness of these secrets. The strongest practice is to ensure + that any pre-shared key contain as much randomness as the strongest + key being negotiated. Deriving a shared secret from a password, + name, or other low-entropy source is not secure. These sources are + subject to dictionary and social engineering attacks, among others. + + The NAT_DETECTION_*_IP notifications contain a hash of the addresses + and ports in an attempt to hide internal IP addresses behind a NAT. + Since the IPv4 address space is only 32 bits, and it is usually very + sparse, it would be possible for an attacker to find out the internal + address used behind the NAT box by trying all possible IP addresses + and trying to find the matching hash. The port numbers are normally + fixed to 500, and the SPIs can be extracted from the packet. This + reduces the number of hash calculations to 2^32. With an educated + guess of the use of private address space, the number of hash + calculations is much smaller. Designers should therefore not assume + that use of IKE will not leak internal address information. + + When using an EAP authentication method that does not generate a + shared key for protecting a subsequent AUTH payload, certain man-in- + the-middle and server impersonation attacks are possible [EAPMITM]. + These vulnerabilities occur when EAP is also used in protocols that + are not protected with a secure tunnel. Since EAP is a general- + purpose authentication protocol, which is often used to provide + single-signon facilities, a deployed IPsec solution that relies on an + EAP authentication method that does not generate a shared key (also + known as a non-key-generating EAP method) can become compromised due + to the deployment of an entirely unrelated application that also + happens to use the same non-key-generating EAP method, but in an + unprotected fashion. Note that this vulnerability is not limited to + just EAP, but can occur in other scenarios where an authentication + infrastructure is reused. For example, if the EAP mechanism used by + IKEv2 utilizes a token authenticator, a man-in-the-middle attacker + could impersonate the web server, intercept the token authentication + exchange, and use it to initiate an IKEv2 connection. For this + reason, use of non-key-generating EAP methods SHOULD be avoided where + possible. Where they are used, it is extremely important that all + usages of these EAP methods SHOULD utilize a protected tunnel, where + the initiator validates the responder's certificate before initiating + the EAP exchange. {{ Demoted the SHOULD }} Implementers should + describe the vulnerabilities of using non-key-generating EAP methods + in the documentation of their implementations so that the + administrators deploying IPsec solutions are aware of these dangers. + + An implementation using EAP MUST also use a public-key-based + authentication of the server to the client before the EAP exchange + begins, even if the EAP method offers mutual authentication. This + avoids having additional IKEv2 protocol variations and protects the + + + +Kaufman, et al. Expires August 27, 2006 [Page 106] + +Internet-Draft IKEv2bis February 2006 + + + EAP data from active attackers. + + If the messages of IKEv2 are long enough that IP-level fragmentation + is necessary, it is possible that attackers could prevent the + exchange from completing by exhausting the reassembly buffers. The + chances of this can be minimized by using the Hash and URL encodings + instead of sending certificates (see Section 3.6). Additional + mitigations are discussed in [DOSUDPPROT]. + +5.1. Traffic selector authorization + + {{ Added this section from Clarif-4.13 }} + + IKEv2 relies on information in the Peer Authorization Database (PAD) + when determining what kind of IPsec SAs a peer is allowed to create. + This process is described in [IPSECARCH] Section 4.4.3. When a peer + requests the creation of an IPsec SA with some traffic selectors, the + PAD must contain "Child SA Authorization Data" linking the identity + authenticated by IKEv2 and the addresses permitted for traffic + selectors. + + For example, the PAD might be configured so that authenticated + identity "sgw23.example.com" is allowed to create IPsec SAs for + 192.0.2.0/24, meaning this security gateway is a valid + "representative" for these addresses. Host-to-host IPsec requires + similar entries, linking, for example, "fooserver4.example.com" with + 192.0.1.66/32, meaning this identity a valid "owner" or + "representative" of the address in question. + + As noted in [IPSECARCH], "It is necessary to impose these constraints + on creation of child SAs to prevent an authenticated peer from + spoofing IDs associated with other, legitimate peers." In the + example given above, a correct configuration of the PAD prevents + sgw23 from creating IPsec SAs with address 192.0.1.66, and prevents + fooserver4 from creating IPsec SAs with addresses from 192.0.2.0/24. + + It is important to note that simply sending IKEv2 packets using some + particular address does not imply a permission to create IPsec SAs + with that address in the traffic selectors. For example, even if + sgw23 would be able to spoof its IP address as 192.0.1.66, it could + not create IPsec SAs matching fooserver4's traffic. + + The IKEv2 specification does not specify how exactly IP address + assignment using configuration payloads interacts with the PAD. Our + interpretation is that when a security gateway assigns an address + using configuration payloads, it also creates a temporary PAD entry + linking the authenticated peer identity and the newly allocated inner + address. + + + +Kaufman, et al. Expires August 27, 2006 [Page 107] + +Internet-Draft IKEv2bis February 2006 + + + It has been recognized that configuring the PAD correctly may be + difficult in some environments. For instance, if IPsec is used + between a pair of hosts whose addresses are allocated dynamically + using DHCP, it is extremely difficult to ensure that the PAD + specifies the correct "owner" for each IP address. This would + require a mechanism to securely convey address assignments from the + DHCP server, and link them to identities authenticated using IKEv2. + + Due to this limitation, some vendors have been known to configure + their PADs to allow an authenticated peer to create IPsec SAs with + traffic selectors containing the same address that was used for the + IKEv2 packets. In environments where IP spoofing is possible (i.e., + almost everywhere) this essentially allows any peer to create IPsec + SAs with any traffic selectors. This is not an appropriate or secure + configuration in most circumstances. See [H2HIPSEC] for an extensive + discussion about this issue, and the limitations of host-to-host + IPsec in general. + + +6. IANA Considerations + + {{ This section was changed to not re-define any new IANA registries. + }} + + [IKEV2] defined many field types and values. IANA has already + registered those types and values, so the are not listed here again. + No new types or values are registered in this document. + + +7. Acknowledgements + + The acknowledgements from the IKEv2 document were: + + This document is a collaborative effort of the entire IPsec WG. If + there were no limit to the number of authors that could appear on an + RFC, the following, in alphabetical order, would have been listed: + Bill Aiello, Stephane Beaulieu, Steve Bellovin, Sara Bitan, Matt + Blaze, Ran Canetti, Darren Dukes, Dan Harkins, Paul Hoffman, John + Ioannidis, Charlie Kaufman, Steve Kent, Angelos Keromytis, Tero + Kivinen, Hugo Krawczyk, Andrew Krywaniuk, Radia Perlman, Omer + Reingold, and Michael Richardson. Many other people contributed to + the design. It is an evolution of IKEv1, ISAKMP, and the IPsec DOI, + each of which has its own list of authors. Hugh Daniel suggested the + feature of having the initiator, in message 3, specify a name for the + responder, and gave the feature the cute name "You Tarzan, Me Jane". + David Faucher and Valery Smyzlov helped refine the design of the + traffic selector negotiation. + + + + +Kaufman, et al. Expires August 27, 2006 [Page 108] + +Internet-Draft IKEv2bis February 2006 + + + This paragraph lists references that appear only in figures. The + section is only here to keep the 'xml2rfc' program happy, and will be + removed when the document is published. Feel free to ignore it. + [DES] [IDEA] [MD5] [X.501] [X.509] + + +8. References + +8.1. Normative References + + [ADDGROUP] + Kivinen, T. and M. Kojo, "More Modular Exponential (MODP) + Diffie-Hellman groups for Internet Key Exchange (IKE)", + RFC 3526, May 2003. + + [ADDRIPV6] + Hinden, R. and S. Deering, "Internet Protocol Version 6 + (IPv6) Addressing Architecture", RFC 3513, April 2003. + + [Clarif] "IKEv2 Clarifications and Implementation Guidelines", + draft-eronen-ipsec-ikev2-clarifications (work in + progress). + + [EAP] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H. + Levkowetz, "Extensible Authentication Protocol (EAP)", + RFC 3748, June 2004. + + [ECN] Ramakrishnan, K., Floyd, S., and D. Black, "The Addition + of Explicit Congestion Notification (ECN) to IP", + RFC 3168, September 2001. + + [ESPCBC] Pereira, R. and R. Adams, "The ESP CBC-Mode Cipher + Algorithms", RFC 2451, November 1998. + + [IANACONS] + Narten, T. and H. Alvestrand, "Guidelines for Writing an + IANA Considerations Section in RFCs", BCP 26, RFC 2434. + + [IKEV2] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol", + RFC 4306, December 2005. + + [IPSECARCH] + Kent, S. and K. Seo, "Security Architecture for the + Internet Protocol", RFC 4301, December 2005. + + [MUSTSHOULD] + Bradner, S., "Key Words for use in RFCs to indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + + +Kaufman, et al. Expires August 27, 2006 [Page 109] + +Internet-Draft IKEv2bis February 2006 + + + [PKIX] Housley, R., Polk, W., Ford, W., and D. Solo, "Internet + X.509 Public Key Infrastructure Certificate and + Certificate Revocation List (CRL) Profile", RFC 3280, + April 2002. + + [UDPENCAPS] + Huttunen, A., Swander, B., Volpe, V., DiBurro, L., and M. + Stenberg, "UDP Encapsulation of IPsec ESP Packets", + RFC 3948, January 2005. + +8.2. Informative References + + [AH] Kent, S., "IP Authentication Header", RFC 4302, + December 2005. + + [ARCHGUIDEPHIL] + Bush, R. and D. Meyer, "Some Internet Architectural + Guidelines and Philosophy", RFC 3439, December 2002. + + [ARCHPRINC] + Carpenter, B., "Architectural Principles of the Internet", + RFC 1958, June 1996. + + [DES] American National Standards Institute, "American National + Standard for Information Systems-Data Link Encryption", + ANSI X3.106, 1983. + + [DH] Diffie, W. and M. Hellman, "New Directions in + Cryptography", IEEE Transactions on Information Theory, + V.IT-22 n. 6, June 1977. + + [DHCP] Droms, R., "Dynamic Host Configuration Protocol", + RFC 2131, March 1997. + + [DIFFSERVARCH] + Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z., + and W. Weiss, "An Architecture for Differentiated + Services", RFC 2475. + + [DIFFSERVFIELD] + Nichols, K., Blake, S., Baker, F., and D. Black, + "Definition of the Differentiated Services Field (DS + Field) in the IPv4 and IPv6 Headers", RFC 2474, + December 1998. + + [DIFFTUNNEL] + Black, D., "Differentiated Services and Tunnels", + RFC 2983, October 2000. + + + +Kaufman, et al. Expires August 27, 2006 [Page 110] + +Internet-Draft IKEv2bis February 2006 + + + [DOI] Piper, D., "The Internet IP Security Domain of + Interpretation for ISAKMP", RFC 2407, November 1998. + + [DOSUDPPROT] + C. Kaufman, R. Perlman, and B. Sommerfeld, "DoS protection + for UDP-based protocols", ACM Conference on Computer and + Communications Security , October 2003. + + [DSS] National Institute of Standards and Technology, U.S. + Department of Commerce, "Digital Signature Standard", + FIPS 186, May 1994. + + [EAPMITM] N. Asokan, V. Nierni, and K. Nyberg, "Man-in-the-Middle in + Tunneled Authentication Protocols", November 2002, + <http://eprint.iacr.org/2002/163>. + + [ESP] Kent, S., "IP Encapsulating Security Payload (ESP)", + RFC 4303, December 2005. + + [EXCHANGEANALYSIS] + R. Perlman and C. Kaufman, "Analysis of the IPsec key + exchange Standard", WET-ICE Security Conference, MIT , + 2001, + <http://sec.femto.org/wetice-2001/papers/radia-paper.pdf>. + + [H2HIPSEC] + Aura, T., Roe, M., and A. Mohammed, "Experiences with + Host-to-Host IPsec", 13th International Workshop on + Security Protocols, Cambridge, UK, April 2005. + + [HMAC] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed- + Hashing for Message Authentication", RFC 2104, + February 1997. + + [IDEA] X. Lai, "On the Design and Security of Block Ciphers", ETH + Series in Information Processing, v. 1, Konstanz: Hartung- + Gorre Verlag, 1992. + + [IKEV1] Harkins, D. and D. Carrel, "The Internet Key Exchange + (IKE)", RFC 2409, November 1998. + + [IPCOMP] Shacham, A., Monsour, B., Pereira, R., and M. Thomas, "IP + Payload Compression Protocol (IPComp)", RFC 3173, + September 2001. + + [IPSECARCH-OLD] + Kent, S. and R. Atkinson, "Security Architecture for the + Internet Protocol", RFC 2401, November 1998. + + + +Kaufman, et al. Expires August 27, 2006 [Page 111] + +Internet-Draft IKEv2bis February 2006 + + + [IPV6ADDR] + Hinden, R. and S. Deering, "Internet Protocol Version 6 + (IPv6) Addressing Architecture", RFC 3513, April 2003. + + [ISAKMP] Maughan, D., Schneider, M., and M. Schertler, "Internet + Security Association and Key Management Protocol + (ISAKMP)", RFC 2408, November 1998. + + [LDAP] Wahl, M., Howes, T., and S. Kille, "Lightweight Directory + Access Protocol (v3)", RFC 2251, December 1997. + + [MAILFORMAT] + Resnick, P., "Internet Message Format", RFC 2822, + April 2001. + + [MD5] Rivest, R., "The MD5 Message-Digest Algorithm", RFC 1321, + April 1992. + + [MIPV6] Johnson, D., Perkins, C., and J. Arkko, "Mobility Support + in IPv6", RFC 3775, June 2004. + + [MLDV2] Vida, R. and L. Costa, "Multicast Listener Discovery + Version 2 (MLDv2) for IPv6", RFC 3810, June 2004. + + [NAI] Aboba, B. and M. Beadles, "The Network Access Identifier", + RFC 2486, January 1999. + + [NATREQ] Aboba, B. and W. Dixon, "IPsec-Network Address Translation + (NAT) Compatibility Requirements", RFC 3715, March 2004. + + [OAKLEY] Orman, H., "The OAKLEY Key Determination Protocol", + RFC 2412, November 1998. + + [PFKEY] McDonald, D., Metz, C., and B. Phan, "PF_KEY Key + Management API, Version 2", RFC 2367, July 1998. + + [PHOTURIS] + Karn, P. and W. Simpson, "Photuris: Session-Key Management + Protocol", RFC 2522, March 1999. + + [PKCS1] B. Kaliski and J. Staddon, "PKCS #1: RSA Cryptography + Specifications Version 2", September 1998. + + [PRFAES128CBC] + Hoffman, P., "The AES-XCBC-PRF-128 Algorithm for the + Internet Key Exchange Protocol (IKE)", RFC 3664, + January 2004. + + + + +Kaufman, et al. Expires August 27, 2006 [Page 112] + +Internet-Draft IKEv2bis February 2006 + + + [PRFAES128CBC-bis] + Hoffman, P., "The AES-XCBC-PRF-128 Algorithm for the + Internet Key Exchange Protocol (IKE)", + draft-hoffman-rfc3664bis (work in progress), October 2005. + + [RADIUS] Rigney, C., Rubens, A., Simpson, W., and S. Willens, + "Remote Authentication Dial In User Service (RADIUS)", + RFC 2138, April 1997. + + [RANDOMNESS] + Eastlake, D., Schiller, J., and S. Crocker, "Randomness + Requirements for Security", BCP 106, RFC 4086, June 2005. + + [REAUTH] Nir, Y., ""Repeated Authentication in IKEv2", + draft-nir-ikev2-auth-lt (work in progress), May 2005. + + [RSA] R. Rivest, A. Shamir, and L. Adleman, "A Method for + Obtaining Digital Signatures and Public-Key + Cryptosystems", February 1978. + + [SHA] National Institute of Standards and Technology, U.S. + Department of Commerce, "Secure Hash Standard", + FIPS 180-1, May 1994. + + [SIGMA] H. Krawczyk, "SIGMA: the `SIGn-and-MAc' Approach to + Authenticated Diffie-Hellman and its Use in the IKE + Protocols", Advances in Cryptography - CRYPTO 2003 + Proceedings LNCS 2729, 2003, <http:// + www.informatik.uni-trier.de/~ley/db/conf/crypto/ + crypto2003.html>. + + [SKEME] H. Krawczyk, "SKEME: A Versatile Secure Key Exchange + Mechanism for Internet", IEEE Proceedings of the 1996 + Symposium on Network and Distributed Systems Security , + 1996. + + [TRANSPARENCY] + Carpenter, B., "Internet Transparency", RFC 2775, + February 2000. + + [X.501] ITU-T, "Recommendation X.501: Information Technology - + Open Systems Interconnection - The Directory: Models", + 1993. + + [X.509] ITU-T, "Recommendation X.509 (1997 E): Information + Technology - Open Systems Interconnection - The Directory: + Authentication Framework", 1997. + + + + +Kaufman, et al. Expires August 27, 2006 [Page 113] + +Internet-Draft IKEv2bis February 2006 + + +Appendix A. Summary of changes from IKEv1 + + The goals of this revision to IKE are: + + 1. To define the entire IKE protocol in a single document, + replacing RFCs 2407, 2408, and 2409 and incorporating subsequent + changes to support NAT Traversal, Extensible Authentication, and + Remote Address acquisition; + + 2. To simplify IKE by replacing the eight different initial + exchanges with a single four-message exchange (with changes in + authentication mechanisms affecting only a single AUTH payload + rather than restructuring the entire exchange) see + [EXCHANGEANALYSIS]; + + 3. To remove the Domain of Interpretation (DOI), Situation (SIT), + and Labeled Domain Identifier fields, and the Commit and + Authentication only bits; + + 4. To decrease IKE's latency in the common case by making the + initial exchange be 2 round trips (4 messages), and allowing the + ability to piggyback setup of a CHILD_SA on that exchange; + + 5. To replace the cryptographic syntax for protecting the IKE + messages themselves with one based closely on ESP to simplify + implementation and security analysis; + + 6. To reduce the number of possible error states by making the + protocol reliable (all messages are acknowledged) and sequenced. + This allows shortening CREATE_CHILD_SA exchanges from 3 messages + to 2; + + 7. To increase robustness by allowing the responder to not do + significant processing until it receives a message proving that + the initiator can receive messages at its claimed IP address, + and not commit any state to an exchange until the initiator can + be cryptographically authenticated; + + 8. To fix cryptographic weaknesses such as the problem with + symmetries in hashes used for authentication documented by Tero + Kivinen; + + 9. To specify Traffic Selectors in their own payloads type rather + than overloading ID payloads, and making more flexible the + Traffic Selectors that may be specified; + + 10. To specify required behavior under certain error conditions or + when data that is not understood is received in order to make it + + + +Kaufman, et al. Expires August 27, 2006 [Page 114] + +Internet-Draft IKEv2bis February 2006 + + + easier to make future revisions in a way that does not break + backwards compatibility; + + 11. To simplify and clarify how shared state is maintained in the + presence of network failures and Denial of Service attacks; and + + 12. To maintain existing syntax and magic numbers to the extent + possible to make it likely that implementations of IKEv1 can be + enhanced to support IKEv2 with minimum effort. + + +Appendix B. Diffie-Hellman Groups + + There are two Diffie-Hellman groups defined here for use in IKE. + These groups were generated by Richard Schroeppel at the University + of Arizona. Properties of these primes are described in [OAKLEY]. + + The strength supplied by group one may not be sufficient for the + mandatory-to-implement encryption algorithm and is here for historic + reasons. + + Additional Diffie-Hellman groups have been defined in [ADDGROUP]. + +B.1. Group 1 - 768 Bit MODP + + This group is assigned id 1 (one). + + The prime is: 2^768 - 2 ^704 - 1 + 2^64 * { [2^638 pi] + 149686 } + Its hexadecimal value is: + + FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1 + 29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD + EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245 + E485B576 625E7EC6 F44C42E9 A63A3620 FFFFFFFF FFFFFFFF + + The generator is 2. + +B.2. Group 2 - 1024 Bit MODP + + This group is assigned id 2 (two). + + + + + + + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 115] + +Internet-Draft IKEv2bis February 2006 + + + The prime is 2^1024 - 2^960 - 1 + 2^64 * { [2^894 pi] + 129093 }. + Its hexadecimal value is: + + FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1 + 29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD + EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245 + E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED + EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE65381 + FFFFFFFF FFFFFFFF + + The generator is 2. + + +Appendix C. Exchanges and Payloads + + {{ Clarif-AppA }} + + This appendix contains a short summary of the IKEv2 exchanges, and + what payloads can appear in which message. This appendix is purely + informative; if it disagrees with the body of this document, the + other text is considered correct. + + Vendor-ID (V) payloads may be included in any place in any message. + This sequence here shows what are the most logical places for them. + +C.1. IKE_SA_INIT Exchange + + request --> [N(COOKIE)], + SA, KE, Ni, + [N(NAT_DETECTION_SOURCE_IP)+, + N(NAT_DETECTION_DESTINATION_IP)], + [V+] + + normal response <-- SA, KE, Nr, + (no cookie) [N(NAT_DETECTION_SOURCE_IP), + N(NAT_DETECTION_DESTINATION_IP)], + [[N(HTTP_CERT_LOOKUP_SUPPORTED)], CERTREQ+], + [V+] + + + + + + + + + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 116] + +Internet-Draft IKEv2bis February 2006 + + +C.2. IKE_AUTH Exchange without EAP + + request --> IDi, [CERT+], + [N(INITIAL_CONTACT)], + [[N(HTTP_CERT_LOOKUP_SUPPORTED)], CERTREQ+], + [IDr], + AUTH, + [CP(CFG_REQUEST)], + [N(IPCOMP_SUPPORTED)+], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, TSi, TSr, + [V+] + + response <-- IDr, [CERT+], + AUTH, + [CP(CFG_REPLY)], + [N(IPCOMP_SUPPORTED)], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, TSi, TSr, + [N(ADDITIONAL_TS_POSSIBLE)], + [V+] + + + + + + + + + + + + + + + + + + + + + + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 117] + +Internet-Draft IKEv2bis February 2006 + + +C.3. IKE_AUTH Exchange with EAP + + first request --> IDi, + [N(INITIAL_CONTACT)], + [[N(HTTP_CERT_LOOKUP_SUPPORTED)], CERTREQ+], + [IDr], + [CP(CFG_REQUEST)], + [N(IPCOMP_SUPPORTED)+], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, TSi, TSr, + [V+] + + first response <-- IDr, [CERT+], AUTH, + EAP, + [V+] + + / --> EAP + repeat 1..N times | + \ <-- EAP + + last request --> AUTH + + last response <-- AUTH, + [CP(CFG_REPLY)], + [N(IPCOMP_SUPPORTED)], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, TSi, TSr, + [N(ADDITIONAL_TS_POSSIBLE)], + [V+] + + + + + + + + + + + + + + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 118] + +Internet-Draft IKEv2bis February 2006 + + +C.4. CREATE_CHILD_SA Exchange for Creating or Rekeying CHILD_SAs + + request --> [N(REKEY_SA)], + [N(IPCOMP_SUPPORTED)+], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, Ni, [KEi], TSi, TSr + + response <-- [N(IPCOMP_SUPPORTED)], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, Nr, [KEr], TSi, TSr, + [N(ADDITIONAL_TS_POSSIBLE)] + +C.5. CREATE_CHILD_SA Exchange for Rekeying the IKE_SA + + request --> SA, Ni, [KEi] + + response <-- SA, Nr, [KEr] + +C.6. INFORMATIONAL Exchange + + request --> [N+], + [D+], + [CP(CFG_REQUEST)] + + response <-- [N+], + [D+], + [CP(CFG_REPLY)] + + +Appendix D. Changes Between Internet Draft Versions + + This section will be removed before publication as an RFC. + +D.1. Changes from IKEv2 to draft -00 + + There were a zillion additions from the Clarifications document. + These are noted with "{{ Clarif-nn }}". The numbers used in the text + of this version are based on + draft-eronen-ipsec-ikev2-clarifications-08.txt, which has different + numbers than earlier versions of that draft. + + Cleaned up many of the figures. Made the table headings consistent. + Made some tables easier to read by removing blank spaces. Removed + the "reserved to IANA" and "private use" text wording and moved it + + + +Kaufman, et al. Expires August 27, 2006 [Page 119] + +Internet-Draft IKEv2bis February 2006 + + + into the tables. + + Changed many SHOULD requirements to better match RFC 2119. These are + also marked with comments such as "{{ Demoted the SHOULD }}". + + In Section 2.16, changed the MUST requirement of authenticating the + responder from "public key signature based" to "strong" because that + is what most current IKEv2 implementations do, and it better matches + the actual security requirement. + + +Authors' Addresses + + Charlie Kaufman + Microsoft + 1 Microsoft Way + Redmond, WA 98052 + US + + Phone: 1-425-707-3335 + Email: charliek@microsoft.com + + + Paul Hoffman + VPN Consortium + 127 Segre Place + Santa Cruz, CA 95060 + US + + Phone: 1-831-426-9827 + Email: paul.hoffman@vpnc.org + + + Pasi Eronen + Nokia Research Center + P.O. Box 407 + FIN-00045 Nokia Group + Finland + + Email: pasi.eronen@nokia.com + + +Full Copyright Statement + + Copyright (C) The Internet Society (2006). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + + + +Kaufman, et al. Expires August 27, 2006 [Page 120] + +Internet-Draft IKEv2bis February 2006 + + + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at + ietf-ipr@ietf.org. + + +Acknowledgment + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + + + +Kaufman, et al. Expires August 27, 2006 [Page 121] + diff --git a/doc/standards/draft-myers-ikev2-ocsp-03.txt b/doc/standards/draft-myers-ikev2-ocsp-03.txt new file mode 100644 index 000000000..fb59fc958 --- /dev/null +++ b/doc/standards/draft-myers-ikev2-ocsp-03.txt @@ -0,0 +1,785 @@ + + + +Network Working Group M. Myers +Internet-Draft TraceRoute Security LLC +Expires: January 12, 2007 H. Tschofenig + Siemens + July 11, 2006 + + + OCSP Extensions to IKEv2 + draft-myers-ikev2-ocsp-03.txt + +Status of this Memo + + By submitting this Internet-Draft, each author represents that any + applicable patent or other IPR claims of which he or she is aware + have been or will be disclosed, and any of which he or she becomes + aware will be disclosed, in accordance with Section 6 of BCP 79. + + Internet-Drafts are working documents of the Internet Engineering + Task Force (IETF), its areas, and its working groups. Note that + other groups may also distribute working documents as Internet- + Drafts. + + Internet-Drafts are draft documents valid for a maximum of six months + and may be updated, replaced, or obsoleted by other documents at any + time. It is inappropriate to use Internet-Drafts as reference + material or to cite them other than as "work in progress." + + The list of current Internet-Drafts can be accessed at + http://www.ietf.org/ietf/1id-abstracts.txt. + + The list of Internet-Draft Shadow Directories can be accessed at + http://www.ietf.org/shadow.html. + + This Internet-Draft will expire on January 12, 2007. + +Copyright Notice + + Copyright (C) The Internet Society (2006). + +Abstract + + While IKEv2 supports public key based authentication (PKI), the + corresponding use of in-band CRLs is problematic due to unbounded CRL + size. The size of an OCSP response is however well-bounded and + small. This document defines the "OCSP Content" extension to IKEv2. + A CERTREQ payload with "OCSP Content" identifies one or more trusted + OCSP responders and is a request for inclusion of an OCSP response in + the IKEv2 handshake. A cooperative recipient of such a request + + + +Myers & Tschofenig Expires January 12, 2007 [Page 1] + +Internet-Draft OCSP Extensions to IKEv2 July 2006 + + + responds with a CERT payload containing the appropriate OCSP + response. This content is recognizable via the same "OCSP Content" + identifier. + + When certificates are used with IKEv2, the communicating peers need a + mechanism to determine the revocation status of the peer's + certificate. OCSP is one such mechanism. This document applies when + OCSP is desired and security policy prevents one of the IKEv2 peers + from accessing the relevant OCSP responder directly. Firewalls are + often deployed in a manner that prevents such access by IKEv2 peers + outside of an enterprise network. + + +Table of Contents + + 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 + 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 + 3. Extension Definition . . . . . . . . . . . . . . . . . . . . . 5 + 3.1. OCSP Request . . . . . . . . . . . . . . . . . . . . . . . 5 + 3.2. OCSP Response . . . . . . . . . . . . . . . . . . . . . . 5 + 4. Extension Requirements . . . . . . . . . . . . . . . . . . . . 6 + 4.1. OCSP Request . . . . . . . . . . . . . . . . . . . . . . . 6 + 4.2. OCSP Response . . . . . . . . . . . . . . . . . . . . . . 6 + 5. Examples and Discussion . . . . . . . . . . . . . . . . . . . 8 + 5.1. Peer to Peer . . . . . . . . . . . . . . . . . . . . . . . 8 + 5.2. Extended Authentication Protocol (EAP) . . . . . . . . . . 9 + 6. Security Considerations . . . . . . . . . . . . . . . . . . . 10 + 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 11 + 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 12 + 9. Normative References . . . . . . . . . . . . . . . . . . . . . 12 + Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 13 + Intellectual Property and Copyright Statements . . . . . . . . . . 14 + + + + + + + + + + + + + + + + + + + +Myers & Tschofenig Expires January 12, 2007 [Page 2] + +Internet-Draft OCSP Extensions to IKEv2 July 2006 + + +1. Introduction + + Version 2 of the Internet Key Exchange (IKE) protocol [IKEv2] + supports a range of authentication mechanisms, including the use of + public key based authentication. Confirmation of certificate + reliability is essential to achieve the security assurances public + key cryptography provides. One fundamental element of such + confirmation is reference to certificate revocation status (see + [RFC3280] for additional detail). + + The historic means of determining certificate revocation status is + through the use of Certificate Revocation Lists (CRLs). IKEv2 allows + CRLs to be exchanged in-band via the CERT payload. + + CRLs can however grow unbounded in size. Many real-world examples + exist to demonstrate the impracticality of including a multi-megabyte + file in an IKE exchange. This constraint is particularly acute in + bandwidth limited environments (e.g., mobile communications). The + net effect is exclusion of in-band CRLs in favor of out-of-band (OOB) + acquisition of these data, should they even be used at all. + + Reliance on OOB methods can be further complicated if access to + revocation data requires use of IPsec (and therefore IKE) to + establish secure and authorized access to the CRLs of an IKE + participant. Such network access deadlock further contributes to a + reduced reliance on certificate revocation status in favor of blind + trust. + + OCSP [RFC2560] offers a useful alternative. The size of an OCSP + response is bounded and small and therefore suitable for in-band + IKEv2 signaling of a certificate's revocation status. + + This document defines an extension to IKEv2 that enables the use of + OCSP for in-band signaling of certificate revocation status. A new + content encoding is defined for use in the CERTREQ and CERT payloads. + A CERTREQ payload with "OCSP Content" identifies one or more trusted + OCSP responders and is a request for inclusion of an OCSP response in + the IKEv2 handshake. A cooperative recipient of such a request + responds with a CERT payload containing the appropriate OCSP + response. This content is recognizable via the same "OCSP Content" + identifier. + + + + + + + + + + +Myers & Tschofenig Expires January 12, 2007 [Page 3] + +Internet-Draft OCSP Extensions to IKEv2 July 2006 + + +2. Terminology + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in RFC 2119 [RFC2119]. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Myers & Tschofenig Expires January 12, 2007 [Page 4] + +Internet-Draft OCSP Extensions to IKEv2 July 2006 + + +3. Extension Definition + + With reference to Section 3.6 of [IKEv2], the values for the Cert + Encoding field of the CERT payload are extended as follows (see also + the IANA Considerations section of this document): + + Certificate Encoding Value + -------------------- ----- + OCSP Content 14 + +3.1. OCSP Request + + A value of OCSP Content (14) in the Cert Encoding field of a CERTREQ + Payload indicates the presence of one or more OCSP Responder + certificate hashes in the Certificate Authority field of the CERTREQ + payload. + + The presence of OCSP Content (14) in a CERTREQ message: + + 1. identifies one or more OCSP responders trusted by the sender; + + 2. notifies the recipient of sender's support for the OCSP extension + to IKEv2; and + + 3. notifies the recipient of sender's desire to receive OCSP + confirmation in a subsequent CERT payload. + +3.2. OCSP Response + + A value of OCSP Content (14) in the Cert Encoding field of a CERT + Payload indicates the presence of an OCSP Response in the Certificate + Data field of the CERT payload. + + Correlation between an OCSP Response CERT payload and a corresponding + CERT payload carrying a certificate can be achieved by matching the + OCSP response CertID field to the certificate. See [RFC2560] for the + definition of OCSP response content. + + + + + + + + + + + + + + +Myers & Tschofenig Expires January 12, 2007 [Page 5] + +Internet-Draft OCSP Extensions to IKEv2 July 2006 + + +4. Extension Requirements + +4.1. OCSP Request + + Section 3.7 of [IKEv2] allows for the concatenation of trust anchor + hashes as the Certification Authority value of a single CERTREQ + message. There is no means however to indicate which among those + hashes relates to the certificate of a trusted OCSP responder. + + Therefore an OCSP Request as defined in Section 3.1 above SHALL be + transmitted separate from any other CERTREQ payloads in an IKEv2 + exchange. + + Where it is useful to identify more than one trusted OCSP responder, + each such identification SHALL be concatenated in a manner identical + to the method documented in Section 3.7 of [IKEv2] regarding the + assembly of multiple trust anchor hashes. + + The Certification Authority value in an OCSP Request CERTREQ SHALL be + computed and produced in a manner identical to that of trust anchor + hashes as documented in Section 3.7 of [IKEv2]. + + Upon receipt of an OCSP Response CERT payload corresponding to a + prior OCSP Request CERTREQ, the CERTREQ sender SHALL incorporate the + OCSP response into path validation logic defined by [RFC3280]. + + The sender of an OCSP Request CERTREQ MAY abort an IKEv2 exchange if + either: + + 1. the corresponding OCSP Response CERT payload indicates that the + subject certificate is revoked; OR + + 2. the corresponding OCSP Response CERT payload indicates an OCSP + error (e.g., malformedRequest, internalError, tryLater, + sigRequired, unauthorized, etc.). + + The sender of an OCSP Request CERTREQ SHOULD accept an IKEv2 exchange + if a corresponding OCSP Response CERT payload is not received. This + might be an indication that this OCSP extension is not supported. + +4.2. OCSP Response + + Upon receipt of an OCSP Request CERTREQ payload, the recipient SHOULD + acquire the related OCSP-based assertion and produce and transmit an + OCSP Response CERT payload corresponding to the certificate needed to + verify its signature on IKEv2 payloads. + + An OCSP Response CERT payload SHALL be transmitted separate from any + + + +Myers & Tschofenig Expires January 12, 2007 [Page 6] + +Internet-Draft OCSP Extensions to IKEv2 July 2006 + + + other CERT payload in an IKEv2 exchange. + + The means by which an OCSP response may be acquired for production of + an OCSP Response CERT payload is out of scope of this document. + + The structure and encoding of the Certificate Data field of an OCSP + Response CERT payload SHALL be identical to that defined in + [RFC2560]. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Myers & Tschofenig Expires January 12, 2007 [Page 7] + +Internet-Draft OCSP Extensions to IKEv2 July 2006 + + +5. Examples and Discussion + + This section shows the standard IKEv2 message examples with both + peers, the initiator and the responder, using public key based + authentication, CERTREQ and CERT payloads. The first instance + corresponds to Section 1.2 of [IKEv2], the illustrations of which are + reproduced below for reference. + +5.1. Peer to Peer + + Application of the IKEv2 extensions defined in this document to the + peer-to-peer exchange defined in Section 1.2 of [IKEv2] is as + follows. Messages are numbered for ease of reference. + + + Initiator Responder + ----------- ----------- + (1) HDR, SAi1, KEi, Ni --> + + (2) <-- HDR, SAr1, KEr, Nr, + CERTREQ(OCSP Request) + (3) HDR, SK {IDi, CERT(certificate),--> + CERT(OCSP Response), + CERTREQ(OCSP Request), + [IDr,] AUTH, SAi2, TSi, TSr} + + (4) <-- HDR, SK {IDr, + CERT(certificate), + CERT(OCSP Response), + AUTH, SAr2, TSi, TSr} + + In (2) Responder sends an OCSP Request CERTREQ payload identifying + one or more OCSP responders trusted by Responder. In response, + Initiator sends in (3) both a CERT payload carrying its certificate + and an OCSP Response CERT payload covering that certificate. In (3) + Initiator also requests an OCSP response via the OCSP Request CERTREQ + payload. In (4) Responder returns its certificate and a separate + OCSP Response CERT payload covering that certificate. + + It is important to note that in this scenario, the Responder in (2) + does not yet possess the Initiator's certificate and therefore cannot + form an OCSP request. [RFC2560] allows for pre-produced responses. + It is thus easily inferred that OCSP responses can be produced in the + absence of a corresponding request (OCSP nonces notwithstanding). In + such instances OCSP Requests are simply index values into these data. + + It is also important in extending IKEv2 towards OCSP in this scenario + that the Initiator has certain knowledge that the Responder is + + + +Myers & Tschofenig Expires January 12, 2007 [Page 8] + +Internet-Draft OCSP Extensions to IKEv2 July 2006 + + + capable of and willing to participate in the extension. Yet the + Responder will only trust one or more OCSP responder signatures. + These factors motivate the definition of OCSP Responder Hash + extension. + +5.2. Extended Authentication Protocol (EAP) + + Another scenario of pressing interest is the use of EAP to + accommodate multiple end users seeking enterprise access to an IPsec + gateway. As with the preceding section, the following illustration + is extracted from [IKEv2]. In the event of a conflict between this + document and[IKEv2] regarding these illustrations, [IKEv2] SHALL + dominate. + + + Initiator Responder + ----------- ----------- + (1) HDR, SAi1, KEi, Ni --> + (2) <-- HDR, SAr1, KEr, Nr + (3) HDR, SK {IDi, --> + CERTREQ(OCSP Request), + [IDr,] AUTH, SAi2, TSi, TSr} + (4) <-- HDR, SK {IDr, + CERT(certificate), + CERT(OCSP Response), + AUTH, EAP} + (5) HDR, SK {EAP} --> + + (6) <-- HDR, SK {EAP (success)} + + (7) HDR, SK {AUTH} --> + + (8) <-- HDR, SK {AUTH, SAr2, TSi, + TSr } + + In the EAP scenario, messages (5) through (8) are not relevant to + this document. Note that while [IKEv2] allows for the optional + inclusion of a CERTREQ in (2), this document asserts no need of its + use. It is assumed that environments including this optional payload + and yet wishing to implement the OCSP extension to IKEv2 are + sufficiently robust as to accommodate this redundant payload. + + + + + + + + + + +Myers & Tschofenig Expires January 12, 2007 [Page 9] + +Internet-Draft OCSP Extensions to IKEv2 July 2006 + + +6. Security Considerations + + For the reasons noted above, OCSP request as defined in Section 3.1 + is used in place of OCSP request syntax to trigger production and + transmission of an OCSP response. OCSP as defined in [RFC2560] may + contain a nonce request extension to improve security against replay + attacks (see Section 4.4.1 of [RFC2560] for further details). The + OCSP Request defined by this document cannot accommodate nonces. + [RFC2560] deals with this aspect by allowing pre-produced responses. + + [RFC2560] points to this replay vulnerability and indicates: "The use + of precomputed responses allows replay attacks in which an old (good) + response is replayed prior to its expiration date but after the + certificate has been revoked. Deployments of OCSP should carefully + evaluate the benefit of precomputed responses against the probability + of a replay attack and the costs associated with its successful + execution." Nodes SHOULD make the required freshness of an OCSP + Response configurable. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Myers & Tschofenig Expires January 12, 2007 [Page 10] + +Internet-Draft OCSP Extensions to IKEv2 July 2006 + + +7. IANA Considerations + + This document defines one new field type for use in the IKEv2 Cert + Encoding field of the Certificate Payload format. Official + assignment of the "OCSP Content" extension to the Cert Encoding table + of Section 3.6 of [IKEv2] needs to be acquired from IANA. + + Certificate Encoding Value + -------------------- ----- + OCSP Content 14 + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Myers & Tschofenig Expires January 12, 2007 [Page 11] + +Internet-Draft OCSP Extensions to IKEv2 July 2006 + + +8. Acknowledgements + + The authors would like to thank Russ Housley for his support. + Additionally, we would like to thank Pasi Eronen, Nicolas Williams, + Liqiang (Larry) Zhu, Lakshminath Dondeti and Paul Hoffman for their + review. + +9. Normative References + + [IKEv2] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol", + RFC 4306, December 2005. + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + [RFC2560] Myers, M., Ankney, R., Malpani, A., Galperin, S., and C. + Adams, "X.509 Internet Public Key Infrastructure Online + Certificate Status Protocol - OCSP", RFC 2560, June 1999. + + [RFC3280] Housley, R., Polk, W., Ford, W., and D. Solo, "Internet + X.509 Public Key Infrastructure Certificate and + Certificate Revocation List (CRL) Profile", RFC 3280, + April 2002. + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Myers & Tschofenig Expires January 12, 2007 [Page 12] + +Internet-Draft OCSP Extensions to IKEv2 July 2006 + + +Authors' Addresses + + Michael Myers + TraceRoute Security LLC + + + Email: mmyers@fastq.com + + + Hannes Tschofenig + Siemens + Otto-Hahn-Ring 6 + Munich, Bavaria 81739 + Germany + + Email: Hannes.Tschofenig@siemens.com + URI: http://www.tschofenig.com + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Myers & Tschofenig Expires January 12, 2007 [Page 13] + +Internet-Draft OCSP Extensions to IKEv2 July 2006 + + +Intellectual Property Statement + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at + ietf-ipr@ietf.org. + + +Disclaimer of Validity + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + + +Copyright Statement + + Copyright (C) The Internet Society (2006). This document is subject + to the rights, licenses and restrictions contained in BCP 78, and + except as set forth therein, the authors retain all their rights. + + +Acknowledgment + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + +Myers & Tschofenig Expires January 12, 2007 [Page 14] + + diff --git a/doc/standards/rfc3748.txt b/doc/standards/rfc3748.txt new file mode 100644 index 000000000..75600c1f2 --- /dev/null +++ b/doc/standards/rfc3748.txt @@ -0,0 +1,3755 @@ + + + + + + +Network Working Group B. Aboba +Request for Comments: 3748 Microsoft +Obsoletes: 2284 L. Blunk +Category: Standards Track Merit Network, Inc + J. Vollbrecht + Vollbrecht Consulting LLC + J. Carlson + Sun + H. Levkowetz, Ed. + ipUnplugged + June 2004 + + + Extensible Authentication Protocol (EAP) + +Status of this Memo + + This document specifies an Internet standards track protocol for the + Internet community, and requests discussion and suggestions for + improvements. Please refer to the current edition of the "Internet + Official Protocol Standards" (STD 1) for the standardization state + and status of this protocol. Distribution of this memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2004). + +Abstract + + This document defines the Extensible Authentication Protocol (EAP), + an authentication framework which supports multiple authentication + methods. EAP typically runs directly over data link layers such as + Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP + provides its own support for duplicate elimination and + retransmission, but is reliant on lower layer ordering guarantees. + Fragmentation is not supported within EAP itself; however, individual + EAP methods may support this. + + This document obsoletes RFC 2284. A summary of the changes between + this document and RFC 2284 is available in Appendix A. + + + + + + + + + + + +Aboba, et al. Standards Track [Page 1] + +RFC 3748 EAP June 2004 + + +Table of Contents + + 1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . 3 + 1.1. Specification of Requirements . . . . . . . . . . . . . 4 + 1.2. Terminology . . . . . . . . . . . . . . . . . . . . . . 4 + 1.3. Applicability . . . . . . . . . . . . . . . . . . . . . 6 + 2. Extensible Authentication Protocol (EAP). . . . . . . . . . . 7 + 2.1. Support for Sequences . . . . . . . . . . . . . . . . . 9 + 2.2. EAP Multiplexing Model. . . . . . . . . . . . . . . . . 10 + 2.3. Pass-Through Behavior . . . . . . . . . . . . . . . . . 12 + 2.4. Peer-to-Peer Operation. . . . . . . . . . . . . . . . . 14 + 3. Lower Layer Behavior. . . . . . . . . . . . . . . . . . . . . 15 + 3.1. Lower Layer Requirements. . . . . . . . . . . . . . . . 15 + 3.2. EAP Usage Within PPP. . . . . . . . . . . . . . . . . . 18 + 3.2.1. PPP Configuration Option Format. . . . . . . . . 18 + 3.3. EAP Usage Within IEEE 802 . . . . . . . . . . . . . . . 19 + 3.4. Lower Layer Indications . . . . . . . . . . . . . . . . 19 + 4. EAP Packet Format . . . . . . . . . . . . . . . . . . . . . . 20 + 4.1. Request and Response. . . . . . . . . . . . . . . . . . 21 + 4.2. Success and Failure . . . . . . . . . . . . . . . . . . 23 + 4.3. Retransmission Behavior . . . . . . . . . . . . . . . . 26 + 5. Initial EAP Request/Response Types. . . . . . . . . . . . . . 27 + 5.1. Identity. . . . . . . . . . . . . . . . . . . . . . . . 28 + 5.2. Notification. . . . . . . . . . . . . . . . . . . . . . 29 + 5.3. Nak . . . . . . . . . . . . . . . . . . . . . . . . . . 31 + 5.3.1. Legacy Nak . . . . . . . . . . . . . . . . . . . 31 + 5.3.2. Expanded Nak . . . . . . . . . . . . . . . . . . 32 + 5.4. MD5-Challenge . . . . . . . . . . . . . . . . . . . . . 35 + 5.5. One-Time Password (OTP) . . . . . . . . . . . . . . . . 36 + 5.6. Generic Token Card (GTC). . . . . . . . . . . . . . . . 37 + 5.7. Expanded Types. . . . . . . . . . . . . . . . . . . . . 38 + 5.8. Experimental. . . . . . . . . . . . . . . . . . . . . . 40 + 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 40 + 6.1. Packet Codes. . . . . . . . . . . . . . . . . . . . . . 41 + 6.2. Method Types. . . . . . . . . . . . . . . . . . . . . . 41 + 7. Security Considerations . . . . . . . . . . . . . . . . . . . 42 + 7.1. Threat Model. . . . . . . . . . . . . . . . . . . . . . 42 + 7.2. Security Claims . . . . . . . . . . . . . . . . . . . . 43 + 7.2.1. Security Claims Terminology for EAP Methods. . . 44 + 7.3. Identity Protection . . . . . . . . . . . . . . . . . . 46 + 7.4. Man-in-the-Middle Attacks . . . . . . . . . . . . . . . 47 + 7.5. Packet Modification Attacks . . . . . . . . . . . . . . 48 + 7.6. Dictionary Attacks. . . . . . . . . . . . . . . . . . . 49 + 7.7. Connection to an Untrusted Network. . . . . . . . . . . 49 + 7.8. Negotiation Attacks . . . . . . . . . . . . . . . . . . 50 + 7.9. Implementation Idiosyncrasies . . . . . . . . . . . . . 50 + 7.10. Key Derivation. . . . . . . . . . . . . . . . . . . . . 51 + 7.11. Weak Ciphersuites . . . . . . . . . . . . . . . . . . . 53 + + + +Aboba, et al. Standards Track [Page 2] + +RFC 3748 EAP June 2004 + + + 7.12. Link Layer. . . . . . . . . . . . . . . . . . . . . . . 53 + 7.13. Separation of Authenticator and Backend Authentication + Server. . . . . . . . . . . . . . . . . . . . . . . . . 54 + 7.14. Cleartext Passwords . . . . . . . . . . . . . . . . . . 55 + 7.15. Channel Binding . . . . . . . . . . . . . . . . . . . . 55 + 7.16. Protected Result Indications. . . . . . . . . . . . . . 56 + 8. Acknowledgements. . . . . . . . . . . . . . . . . . . . . . . 58 + 9. References. . . . . . . . . . . . . . . . . . . . . . . . . . 59 + 9.1. Normative References. . . . . . . . . . . . . . . . . . 59 + 9.2. Informative References. . . . . . . . . . . . . . . . . 60 + Appendix A. Changes from RFC 2284. . . . . . . . . . . . . . . . . 64 + Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 66 + Full Copyright Statement . . . . . . . . . . . . . . . . . . . . . 67 + +1. Introduction + + This document defines the Extensible Authentication Protocol (EAP), + an authentication framework which supports multiple authentication + methods. EAP typically runs directly over data link layers such as + Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP + provides its own support for duplicate elimination and + retransmission, but is reliant on lower layer ordering guarantees. + Fragmentation is not supported within EAP itself; however, individual + EAP methods may support this. + + EAP may be used on dedicated links, as well as switched circuits, and + wired as well as wireless links. To date, EAP has been implemented + with hosts and routers that connect via switched circuits or dial-up + lines using PPP [RFC1661]. It has also been implemented with + switches and access points using IEEE 802 [IEEE-802]. EAP + encapsulation on IEEE 802 wired media is described in [IEEE-802.1X], + and encapsulation on IEEE wireless LANs in [IEEE-802.11i]. + + One of the advantages of the EAP architecture is its flexibility. + EAP is used to select a specific authentication mechanism, typically + after the authenticator requests more information in order to + determine the specific authentication method to be used. Rather than + requiring the authenticator to be updated to support each new + authentication method, EAP permits the use of a backend + authentication server, which may implement some or all authentication + methods, with the authenticator acting as a pass-through for some or + all methods and peers. + + Within this document, authenticator requirements apply regardless of + whether the authenticator is operating as a pass-through or not. + Where the requirement is meant to apply to either the authenticator + or backend authentication server, depending on where the EAP + authentication is terminated, the term "EAP server" will be used. + + + +Aboba, et al. Standards Track [Page 3] + +RFC 3748 EAP June 2004 + + +1.1. Specification of Requirements + + In this document, several words are used to signify the requirements + of the specification. The key words "MUST", "MUST NOT", "REQUIRED", + "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", + and "OPTIONAL" in this document are to be interpreted as described in + [RFC2119]. + +1.2. Terminology + + This document frequently uses the following terms: + + authenticator + The end of the link initiating EAP authentication. The term + authenticator is used in [IEEE-802.1X], and has the same meaning + in this document. + + peer + The end of the link that responds to the authenticator. In + [IEEE-802.1X], this end is known as the Supplicant. + + Supplicant + The end of the link that responds to the authenticator in [IEEE- + 802.1X]. In this document, this end of the link is called the + peer. + + backend authentication server + A backend authentication server is an entity that provides an + authentication service to an authenticator. When used, this + server typically executes EAP methods for the authenticator. This + terminology is also used in [IEEE-802.1X]. + + AAA + Authentication, Authorization, and Accounting. AAA protocols with + EAP support include RADIUS [RFC3579] and Diameter [DIAM-EAP]. In + this document, the terms "AAA server" and "backend authentication + server" are used interchangeably. + + Displayable Message + This is interpreted to be a human readable string of characters. + The message encoding MUST follow the UTF-8 transformation format + [RFC2279]. + + + + + + + + + +Aboba, et al. Standards Track [Page 4] + +RFC 3748 EAP June 2004 + + + EAP server + The entity that terminates the EAP authentication method with the + peer. In the case where no backend authentication server is used, + the EAP server is part of the authenticator. In the case where + the authenticator operates in pass-through mode, the EAP server is + located on the backend authentication server. + + Silently Discard + This means the implementation discards the packet without further + processing. The implementation SHOULD provide the capability of + logging the event, including the contents of the silently + discarded packet, and SHOULD record the event in a statistics + counter. + + Successful Authentication + In the context of this document, "successful authentication" is an + exchange of EAP messages, as a result of which the authenticator + decides to allow access by the peer, and the peer decides to use + this access. The authenticator's decision typically involves both + authentication and authorization aspects; the peer may + successfully authenticate to the authenticator, but access may be + denied by the authenticator due to policy reasons. + + Message Integrity Check (MIC) + A keyed hash function used for authentication and integrity + protection of data. This is usually called a Message + Authentication Code (MAC), but IEEE 802 specifications (and this + document) use the acronym MIC to avoid confusion with Medium + Access Control. + + Cryptographic Separation + Two keys (x and y) are "cryptographically separate" if an + adversary that knows all messages exchanged in the protocol cannot + compute x from y or y from x without "breaking" some cryptographic + assumption. In particular, this definition allows that the + adversary has the knowledge of all nonces sent in cleartext, as + well as all predictable counter values used in the protocol. + Breaking a cryptographic assumption would typically require + inverting a one-way function or predicting the outcome of a + cryptographic pseudo-random number generator without knowledge of + the secret state. In other words, if the keys are + cryptographically separate, there is no shortcut to compute x from + y or y from x, but the work an adversary must do to perform this + computation is equivalent to performing an exhaustive search for + the secret state value. + + + + + + +Aboba, et al. Standards Track [Page 5] + +RFC 3748 EAP June 2004 + + + Master Session Key (MSK) + Keying material that is derived between the EAP peer and server + and exported by the EAP method. The MSK is at least 64 octets in + length. In existing implementations, a AAA server acting as an + EAP server transports the MSK to the authenticator. + + Extended Master Session Key (EMSK) + Additional keying material derived between the EAP client and + server that is exported by the EAP method. The EMSK is at least + 64 octets in length. The EMSK is not shared with the + authenticator or any other third party. The EMSK is reserved for + future uses that are not defined yet. + + Result indications + A method provides result indications if after the method's last + message is sent and received: + + 1) The peer is aware of whether it has authenticated the server, + as well as whether the server has authenticated it. + + 2) The server is aware of whether it has authenticated the peer, + as well as whether the peer has authenticated it. + + In the case where successful authentication is sufficient to + authorize access, then the peer and authenticator will also know if + the other party is willing to provide or accept access. This may not + always be the case. An authenticated peer may be denied access due + to lack of authorization (e.g., session limit) or other reasons. + Since the EAP exchange is run between the peer and the server, other + nodes (such as AAA proxies) may also affect the authorization + decision. This is discussed in more detail in Section 7.16. + +1.3. Applicability + + EAP was designed for use in network access authentication, where IP + layer connectivity may not be available. Use of EAP for other + purposes, such as bulk data transport, is NOT RECOMMENDED. + + Since EAP does not require IP connectivity, it provides just enough + support for the reliable transport of authentication protocols, and + no more. + + EAP is a lock-step protocol which only supports a single packet in + flight. As a result, EAP cannot efficiently transport bulk data, + unlike transport protocols such as TCP [RFC793] or SCTP [RFC2960]. + + + + + + +Aboba, et al. Standards Track [Page 6] + +RFC 3748 EAP June 2004 + + + While EAP provides support for retransmission, it assumes ordering + guarantees provided by the lower layer, so out of order reception is + not supported. + + Since EAP does not support fragmentation and reassembly, EAP + authentication methods generating payloads larger than the minimum + EAP MTU need to provide fragmentation support. + + While authentication methods such as EAP-TLS [RFC2716] provide + support for fragmentation and reassembly, the EAP methods defined in + this document do not. As a result, if the EAP packet size exceeds + the EAP MTU of the link, these methods will encounter difficulties. + + EAP authentication is initiated by the server (authenticator), + whereas many authentication protocols are initiated by the client + (peer). As a result, it may be necessary for an authentication + algorithm to add one or two additional messages (at most one + roundtrip) in order to run over EAP. + + Where certificate-based authentication is supported, the number of + additional roundtrips may be much larger due to fragmentation of + certificate chains. In general, a fragmented EAP packet will require + as many round-trips to send as there are fragments. For example, a + certificate chain 14960 octets in size would require ten round-trips + to send with a 1496 octet EAP MTU. + + Where EAP runs over a lower layer in which significant packet loss is + experienced, or where the connection between the authenticator and + authentication server experiences significant packet loss, EAP + methods requiring many round-trips can experience difficulties. In + these situations, use of EAP methods with fewer roundtrips is + advisable. + +2. Extensible Authentication Protocol (EAP) + + The EAP authentication exchange proceeds as follows: + + [1] The authenticator sends a Request to authenticate the peer. The + Request has a Type field to indicate what is being requested. + Examples of Request Types include Identity, MD5-challenge, etc. + The MD5-challenge Type corresponds closely to the CHAP + authentication protocol [RFC1994]. Typically, the authenticator + will send an initial Identity Request; however, an initial + Identity Request is not required, and MAY be bypassed. For + example, the identity may not be required where it is determined + by the port to which the peer has connected (leased lines, + + + + + +Aboba, et al. Standards Track [Page 7] + +RFC 3748 EAP June 2004 + + + dedicated switch or dial-up ports), or where the identity is + obtained in another fashion (via calling station identity or MAC + address, in the Name field of the MD5-Challenge Response, etc.). + + [2] The peer sends a Response packet in reply to a valid Request. As + with the Request packet, the Response packet contains a Type + field, which corresponds to the Type field of the Request. + + [3] The authenticator sends an additional Request packet, and the + peer replies with a Response. The sequence of Requests and + Responses continues as long as needed. EAP is a 'lock step' + protocol, so that other than the initial Request, a new Request + cannot be sent prior to receiving a valid Response. The + authenticator is responsible for retransmitting requests as + described in Section 4.1. After a suitable number of + retransmissions, the authenticator SHOULD end the EAP + conversation. The authenticator MUST NOT send a Success or + Failure packet when retransmitting or when it fails to get a + response from the peer. + + [4] The conversation continues until the authenticator cannot + authenticate the peer (unacceptable Responses to one or more + Requests), in which case the authenticator implementation MUST + transmit an EAP Failure (Code 4). Alternatively, the + authentication conversation can continue until the authenticator + determines that successful authentication has occurred, in which + case the authenticator MUST transmit an EAP Success (Code 3). + + Advantages: + + o The EAP protocol can support multiple authentication mechanisms + without having to pre-negotiate a particular one. + + o Network Access Server (NAS) devices (e.g., a switch or access + point) do not have to understand each authentication method and + MAY act as a pass-through agent for a backend authentication + server. Support for pass-through is optional. An authenticator + MAY authenticate local peers, while at the same time acting as a + pass-through for non-local peers and authentication methods it + does not implement locally. + + o Separation of the authenticator from the backend authentication + server simplifies credentials management and policy decision + making. + + + + + + + +Aboba, et al. Standards Track [Page 8] + +RFC 3748 EAP June 2004 + + + Disadvantages: + + o For use in PPP, EAP requires the addition of a new authentication + Type to PPP LCP and thus PPP implementations will need to be + modified to use it. It also strays from the previous PPP + authentication model of negotiating a specific authentication + mechanism during LCP. Similarly, switch or access point + implementations need to support [IEEE-802.1X] in order to use EAP. + + o Where the authenticator is separate from the backend + authentication server, this complicates the security analysis and, + if needed, key distribution. + +2.1. Support for Sequences + + An EAP conversation MAY utilize a sequence of methods. A common + example of this is an Identity request followed by a single EAP + authentication method such as an MD5-Challenge. However, the peer + and authenticator MUST utilize only one authentication method (Type 4 + or greater) within an EAP conversation, after which the authenticator + MUST send a Success or Failure packet. + + Once a peer has sent a Response of the same Type as the initial + Request, an authenticator MUST NOT send a Request of a different Type + prior to completion of the final round of a given method (with the + exception of a Notification-Request) and MUST NOT send a Request for + an additional method of any Type after completion of the initial + authentication method; a peer receiving such Requests MUST treat them + as invalid, and silently discard them. As a result, Identity Requery + is not supported. + + A peer MUST NOT send a Nak (legacy or expanded) in reply to a Request + after an initial non-Nak Response has been sent. Since spoofed EAP + Request packets may be sent by an attacker, an authenticator + receiving an unexpected Nak SHOULD discard it and log the event. + + Multiple authentication methods within an EAP conversation are not + supported due to their vulnerability to man-in-the-middle attacks + (see Section 7.4) and incompatibility with existing implementations. + + Where a single EAP authentication method is utilized, but other + methods are run within it (a "tunneled" method), the prohibition + against multiple authentication methods does not apply. Such + "tunneled" methods appear as a single authentication method to EAP. + Backward compatibility can be provided, since a peer not supporting a + "tunneled" method can reply to the initial EAP-Request with a Nak + + + + + +Aboba, et al. Standards Track [Page 9] + +RFC 3748 EAP June 2004 + + + (legacy or expanded). To address security vulnerabilities, + "tunneled" methods MUST support protection against man-in-the-middle + attacks. + +2.2. EAP Multiplexing Model + + Conceptually, EAP implementations consist of the following + components: + + [a] Lower layer. The lower layer is responsible for transmitting and + receiving EAP frames between the peer and authenticator. EAP has + been run over a variety of lower layers including PPP, wired IEEE + 802 LANs [IEEE-802.1X], IEEE 802.11 wireless LANs [IEEE-802.11], + UDP (L2TP [RFC2661] and IKEv2 [IKEv2]), and TCP [PIC]. Lower + layer behavior is discussed in Section 3. + + [b] EAP layer. The EAP layer receives and transmits EAP packets via + the lower layer, implements duplicate detection and + retransmission, and delivers and receives EAP messages to and + from the EAP peer and authenticator layers. + + [c] EAP peer and authenticator layers. Based on the Code field, the + EAP layer demultiplexes incoming EAP packets to the EAP peer and + authenticator layers. Typically, an EAP implementation on a + given host will support either peer or authenticator + functionality, but it is possible for a host to act as both an + EAP peer and authenticator. In such an implementation both EAP + peer and authenticator layers will be present. + + [d] EAP method layers. EAP methods implement the authentication + algorithms and receive and transmit EAP messages via the EAP peer + and authenticator layers. Since fragmentation support is not + provided by EAP itself, this is the responsibility of EAP + methods, which are discussed in Section 5. + + The EAP multiplexing model is illustrated in Figure 1 below. Note + that there is no requirement that an implementation conform to this + model, as long as the on-the-wire behavior is consistent with it. + + + + + + + + + + + + + +Aboba, et al. Standards Track [Page 10] + +RFC 3748 EAP June 2004 + + + +-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+ + | | | | | | + | EAP method| EAP method| | EAP method| EAP method| + | Type = X | Type = Y | | Type = X | Type = Y | + | V | | | ^ | | + +-+-+-+-!-+-+-+-+-+-+-+-+ +-+-+-+-!-+-+-+-+-+-+-+-+ + | ! | | ! | + | EAP ! Peer layer | | EAP ! Auth. layer | + | ! | | ! | + +-+-+-+-!-+-+-+-+-+-+-+-+ +-+-+-+-!-+-+-+-+-+-+-+-+ + | ! | | ! | + | EAP ! layer | | EAP ! layer | + | ! | | ! | + +-+-+-+-!-+-+-+-+-+-+-+-+ +-+-+-+-!-+-+-+-+-+-+-+-+ + | ! | | ! | + | Lower ! layer | | Lower ! layer | + | ! | | ! | + +-+-+-+-!-+-+-+-+-+-+-+-+ +-+-+-+-!-+-+-+-+-+-+-+-+ + ! ! + ! Peer ! Authenticator + +------------>-------------+ + + Figure 1: EAP Multiplexing Model + + Within EAP, the Code field functions much like a protocol number in + IP. It is assumed that the EAP layer demultiplexes incoming EAP + packets according to the Code field. Received EAP packets with + Code=1 (Request), 3 (Success), and 4 (Failure) are delivered by the + EAP layer to the EAP peer layer, if implemented. EAP packets with + Code=2 (Response) are delivered to the EAP authenticator layer, if + implemented. + + Within EAP, the Type field functions much like a port number in UDP + or TCP. It is assumed that the EAP peer and authenticator layers + demultiplex incoming EAP packets according to their Type, and deliver + them only to the EAP method corresponding to that Type. An EAP + method implementation on a host may register to receive packets from + the peer or authenticator layers, or both, depending on which role(s) + it supports. + + Since EAP authentication methods may wish to access the Identity, + implementations SHOULD make the Identity Request and Response + accessible to authentication methods (Types 4 or greater), in + addition to the Identity method. The Identity Type is discussed in + Section 5.1. + + + + + + +Aboba, et al. Standards Track [Page 11] + +RFC 3748 EAP June 2004 + + + A Notification Response is only used as confirmation that the peer + received the Notification Request, not that it has processed it, or + displayed the message to the user. It cannot be assumed that the + contents of the Notification Request or Response are available to + another method. The Notification Type is discussed in Section 5.2. + + Nak (Type 3) or Expanded Nak (Type 254) are utilized for the purposes + of method negotiation. Peers respond to an initial EAP Request for + an unacceptable Type with a Nak Response (Type 3) or Expanded Nak + Response (Type 254). It cannot be assumed that the contents of the + Nak Response(s) are available to another method. The Nak Type(s) are + discussed in Section 5.3. + + EAP packets with Codes of Success or Failure do not include a Type + field, and are not delivered to an EAP method. Success and Failure + are discussed in Section 4.2. + + Given these considerations, the Success, Failure, Nak Response(s), + and Notification Request/Response messages MUST NOT be used to carry + data destined for delivery to other EAP methods. + +2.3. Pass-Through Behavior + + When operating as a "pass-through authenticator", an authenticator + performs checks on the Code, Identifier, and Length fields as + described in Section 4.1. It forwards EAP packets received from the + peer and destined to its authenticator layer to the backend + authentication server; packets received from the backend + authentication server destined to the peer are forwarded to it. + + A host receiving an EAP packet may only do one of three things with + it: act on it, drop it, or forward it. The forwarding decision is + typically based only on examination of the Code, Identifier, and + Length fields. A pass-through authenticator implementation MUST be + capable of forwarding EAP packets received from the peer with Code=2 + (Response) to the backend authentication server. It also MUST be + capable of receiving EAP packets from the backend authentication + server and forwarding EAP packets of Code=1 (Request), Code=3 + (Success), and Code=4 (Failure) to the peer. + + Unless the authenticator implements one or more authentication + methods locally which support the authenticator role, the EAP method + layer header fields (Type, Type-Data) are not examined as part of the + forwarding decision. Where the authenticator supports local + authentication methods, it MAY examine the Type field to determine + whether to act on the packet itself or forward it. Compliant pass- + through authenticator implementations MUST by default forward EAP + packets of any Type. + + + +Aboba, et al. Standards Track [Page 12] + +RFC 3748 EAP June 2004 + + + EAP packets received with Code=1 (Request), Code=3 (Success), and + Code=4 (Failure) are demultiplexed by the EAP layer and delivered to + the peer layer. Therefore, unless a host implements an EAP peer + layer, these packets will be silently discarded. Similarly, EAP + packets received with Code=2 (Response) are demultiplexed by the EAP + layer and delivered to the authenticator layer. Therefore, unless a + host implements an EAP authenticator layer, these packets will be + silently discarded. The behavior of a "pass-through peer" is + undefined within this specification, and is unsupported by AAA + protocols such as RADIUS [RFC3579] and Diameter [DIAM-EAP]. + + The forwarding model is illustrated in Figure 2. + + Peer Pass-through Authenticator Authentication + Server + + +-+-+-+-+-+-+ +-+-+-+-+-+-+ + | | | | + |EAP method | |EAP method | + | V | | ^ | + +-+-+-!-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-!-+-+-+ + | ! | |EAP | EAP | | | ! | + | ! | |Peer | Auth.| EAP Auth. | | ! | + |EAP ! peer| | | +-----------+ | |EAP !Auth.| + | ! | | | ! | ! | | ! | + +-+-+-!-+-+-+ +-+-+-+-!-+-+-+-+-+-!-+-+-+-+ +-+-+-!-+-+-+ + | ! | | ! | ! | | ! | + |EAP !layer| | EAP !layer| EAP !layer | |EAP !layer| + | ! | | ! | ! | | ! | + +-+-+-!-+-+-+ +-+-+-+-!-+-+-+-+-+-!-+-+-+-+ +-+-+-!-+-+-+ + | ! | | ! | ! | | ! | + |Lower!layer| | Lower!layer| AAA ! /IP | | AAA ! /IP | + | ! | | ! | ! | | ! | + +-+-+-!-+-+-+ +-+-+-+-!-+-+-+-+-+-!-+-+-+-+ +-+-+-!-+-+-+ + ! ! ! ! + ! ! ! ! + +-------->--------+ +--------->-------+ + + + Figure 2: Pass-through Authenticator + + For sessions in which the authenticator acts as a pass-through, it + MUST determine the outcome of the authentication solely based on the + Accept/Reject indication sent by the backend authentication server; + the outcome MUST NOT be determined by the contents of an EAP packet + sent along with the Accept/Reject indication, or the absence of such + an encapsulated EAP packet. + + + + +Aboba, et al. Standards Track [Page 13] + +RFC 3748 EAP June 2004 + + +2.4. Peer-to-Peer Operation + + Since EAP is a peer-to-peer protocol, an independent and simultaneous + authentication may take place in the reverse direction (depending on + the capabilities of the lower layer). Both ends of the link may act + as authenticators and peers at the same time. In this case, it is + necessary for both ends to implement EAP authenticator and peer + layers. In addition, the EAP method implementations on both peers + must support both authenticator and peer functionality. + + Although EAP supports peer-to-peer operation, some EAP + implementations, methods, AAA protocols, and link layers may not + support this. Some EAP methods may support asymmetric + authentication, with one type of credential being required for the + peer and another type for the authenticator. Hosts supporting peer- + to-peer operation with such a method would need to be provisioned + with both types of credentials. + + For example, EAP-TLS [RFC2716] is a client-server protocol in which + distinct certificate profiles are typically utilized for the client + and server. This implies that a host supporting peer-to-peer + authentication with EAP-TLS would need to implement both the EAP peer + and authenticator layers, support both peer and authenticator roles + in the EAP-TLS implementation, and provision certificates appropriate + for each role. + + AAA protocols such as RADIUS/EAP [RFC3579] and Diameter EAP [DIAM- + EAP] only support "pass-through authenticator" operation. As noted + in [RFC3579] Section 2.6.2, a RADIUS server responds to an Access- + Request encapsulating an EAP-Request, Success, or Failure packet with + an Access-Reject. There is therefore no support for "pass-through + peer" operation. + + Even where a method is used which supports mutual authentication and + result indications, several considerations may dictate that two EAP + authentications (one in each direction) are required. These include: + + [1] Support for bi-directional session key derivation in the lower + layer. Lower layers such as IEEE 802.11 may only support uni- + directional derivation and transport of transient session keys. + For example, the group-key handshake defined in [IEEE-802.11i] is + uni-directional, since in IEEE 802.11 infrastructure mode, only + the Access Point (AP) sends multicast/broadcast traffic. In IEEE + 802.11 ad hoc mode, where either peer may send + multicast/broadcast traffic, two uni-directional group-key + + + + + + +Aboba, et al. Standards Track [Page 14] + +RFC 3748 EAP June 2004 + + + exchanges are required. Due to limitations of the design, this + also implies the need for unicast key derivations and EAP method + exchanges to occur in each direction. + + [2] Support for tie-breaking in the lower layer. Lower layers such + as IEEE 802.11 ad hoc do not support "tie breaking" wherein two + hosts initiating authentication with each other will only go + forward with a single authentication. This implies that even if + 802.11 were to support a bi-directional group-key handshake, then + two authentications, one in each direction, might still occur. + + [3] Peer policy satisfaction. EAP methods may support result + indications, enabling the peer to indicate to the EAP server + within the method that it successfully authenticated the EAP + server, as well as for the server to indicate that it has + authenticated the peer. However, a pass-through authenticator + will not be aware that the peer has accepted the credentials + offered by the EAP server, unless this information is provided to + the authenticator via the AAA protocol. The authenticator SHOULD + interpret the receipt of a key attribute within an Accept packet + as an indication that the peer has successfully authenticated the + server. + + However, it is possible that the EAP peer's access policy was not + satisfied during the initial EAP exchange, even though mutual + authentication occurred. For example, the EAP authenticator may not + have demonstrated authorization to act in both peer and authenticator + roles. As a result, the peer may require an additional + authentication in the reverse direction, even if the peer provided an + indication that the EAP server had successfully authenticated to it. + +3. Lower Layer Behavior + +3.1. Lower Layer Requirements + + EAP makes the following assumptions about lower layers: + + [1] Unreliable transport. In EAP, the authenticator retransmits + Requests that have not yet received Responses so that EAP does + not assume that lower layers are reliable. Since EAP defines its + own retransmission behavior, it is possible (though undesirable) + for retransmission to occur both in the lower layer and the EAP + layer when EAP is run over a reliable lower layer. + + + + + + + + +Aboba, et al. Standards Track [Page 15] + +RFC 3748 EAP June 2004 + + + Note that EAP Success and Failure packets are not retransmitted. + Without a reliable lower layer, and with a non-negligible error rate, + these packets can be lost, resulting in timeouts. It is therefore + desirable for implementations to improve their resilience to loss of + EAP Success or Failure packets, as described in Section 4.2. + + [2] Lower layer error detection. While EAP does not assume that the + lower layer is reliable, it does rely on lower layer error + detection (e.g., CRC, Checksum, MIC, etc.). EAP methods may not + include a MIC, or if they do, it may not be computed over all the + fields in the EAP packet, such as the Code, Identifier, Length, + or Type fields. As a result, without lower layer error + detection, undetected errors could creep into the EAP layer or + EAP method layer header fields, resulting in authentication + failures. + + For example, EAP TLS [RFC2716], which computes its MIC over the + Type-Data field only, regards MIC validation failures as a fatal + error. Without lower layer error detection, this method, and + others like it, will not perform reliably. + + [3] Lower layer security. EAP does not require lower layers to + provide security services such as per-packet confidentiality, + authentication, integrity, and replay protection. However, where + these security services are available, EAP methods supporting Key + Derivation (see Section 7.2.1) can be used to provide dynamic + keying material. This makes it possible to bind the EAP + authentication to subsequent data and protect against data + modification, spoofing, or replay. See Section 7.1 for details. + + [4] Minimum MTU. EAP is capable of functioning on lower layers that + provide an EAP MTU size of 1020 octets or greater. + + EAP does not support path MTU discovery, and fragmentation and + reassembly is not supported by EAP, nor by the methods defined in + this specification: Identity (1), Notification (2), Nak Response + (3), MD5-Challenge (4), One Time Password (5), Generic Token Card + (6), and expanded Nak Response (254) Types. + + Typically, the EAP peer obtains information on the EAP MTU from + the lower layers and sets the EAP frame size to an appropriate + value. Where the authenticator operates in pass-through mode, + the authentication server does not have a direct way of + determining the EAP MTU, and therefore relies on the + authenticator to provide it with this information, such as via + the Framed-MTU attribute, as described in [RFC3579], Section 2.4. + + + + + +Aboba, et al. Standards Track [Page 16] + +RFC 3748 EAP June 2004 + + + While methods such as EAP-TLS [RFC2716] support fragmentation and + reassembly, EAP methods originally designed for use within PPP + where a 1500 octet MTU is guaranteed for control frames (see + [RFC1661], Section 6.1) may lack fragmentation and reassembly + features. + + EAP methods can assume a minimum EAP MTU of 1020 octets in the + absence of other information. EAP methods SHOULD include support + for fragmentation and reassembly if their payloads can be larger + than this minimum EAP MTU. + + EAP is a lock-step protocol, which implies a certain inefficiency + when handling fragmentation and reassembly. Therefore, if the + lower layer supports fragmentation and reassembly (such as where + EAP is transported over IP), it may be preferable for + fragmentation and reassembly to occur in the lower layer rather + than in EAP. This can be accomplished by providing an + artificially large EAP MTU to EAP, causing fragmentation and + reassembly to be handled within the lower layer. + + [5] Possible duplication. Where the lower layer is reliable, it will + provide the EAP layer with a non-duplicated stream of packets. + However, while it is desirable that lower layers provide for + non-duplication, this is not a requirement. The Identifier field + provides both the peer and authenticator with the ability to + detect duplicates. + + [6] Ordering guarantees. EAP does not require the Identifier to be + monotonically increasing, and so is reliant on lower layer + ordering guarantees for correct operation. EAP was originally + defined to run on PPP, and [RFC1661] Section 1 has an ordering + requirement: + + "The Point-to-Point Protocol is designed for simple links + which transport packets between two peers. These links + provide full-duplex simultaneous bi-directional operation, + and are assumed to deliver packets in order." + + Lower layer transports for EAP MUST preserve ordering between a + source and destination at a given priority level (the ordering + guarantee provided by [IEEE-802]). + + Reordering, if it occurs, will typically result in an EAP + authentication failure, causing EAP authentication to be re-run. + In an environment in which reordering is likely, it is therefore + expected that EAP authentication failures will be common. It is + RECOMMENDED that EAP only be run over lower layers that provide + ordering guarantees; running EAP over raw IP or UDP transport is + + + +Aboba, et al. Standards Track [Page 17] + +RFC 3748 EAP June 2004 + + + NOT RECOMMENDED. Encapsulation of EAP within RADIUS [RFC3579] + satisfies ordering requirements, since RADIUS is a "lockstep" + protocol that delivers packets in order. + +3.2. EAP Usage Within PPP + + In order to establish communications over a point-to-point link, each + end of the PPP link first sends LCP packets to configure the data + link during the Link Establishment phase. After the link has been + established, PPP provides for an optional Authentication phase before + proceeding to the Network-Layer Protocol phase. + + By default, authentication is not mandatory. If authentication of + the link is desired, an implementation MUST specify the + Authentication Protocol Configuration Option during the Link + Establishment phase. + + If the identity of the peer has been established in the + Authentication phase, the server can use that identity in the + selection of options for the following network layer negotiations. + + When implemented within PPP, EAP does not select a specific + authentication mechanism at the PPP Link Control Phase, but rather + postpones this until the Authentication Phase. This allows the + authenticator to request more information before determining the + specific authentication mechanism. This also permits the use of a + "backend" server which actually implements the various mechanisms + while the PPP authenticator merely passes through the authentication + exchange. The PPP Link Establishment and Authentication phases, and + the Authentication Protocol Configuration Option, are defined in The + Point-to-Point Protocol (PPP) [RFC1661]. + +3.2.1. PPP Configuration Option Format + + A summary of the PPP Authentication Protocol Configuration Option + format to negotiate EAP follows. The fields are transmitted from + left to right. + + Exactly one EAP packet is encapsulated in the Information field of a + PPP Data Link Layer frame where the protocol field indicates type hex + C227 (PPP EAP). + + + + + + + + + + +Aboba, et al. Standards Track [Page 18] + +RFC 3748 EAP June 2004 + + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type | Length | Authentication Protocol | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Type + + 3 + + Length + + 4 + + Authentication Protocol + + C227 (Hex) for Extensible Authentication Protocol (EAP) + +3.3. EAP Usage Within IEEE 802 + + The encapsulation of EAP over IEEE 802 is defined in [IEEE-802.1X]. + The IEEE 802 encapsulation of EAP does not involve PPP, and IEEE + 802.1X does not include support for link or network layer + negotiations. As a result, within IEEE 802.1X, it is not possible to + negotiate non-EAP authentication mechanisms, such as PAP or CHAP + [RFC1994]. + +3.4. Lower Layer Indications + + The reliability and security of lower layer indications is dependent + on the lower layer. Since EAP is media independent, the presence or + absence of lower layer security is not taken into account in the + processing of EAP messages. + + To improve reliability, if a peer receives a lower layer success + indication as defined in Section 7.2, it MAY conclude that a Success + packet has been lost, and behave as if it had actually received a + Success packet. This includes choosing to ignore the Success in some + circumstances as described in Section 4.2. + + A discussion of some reliability and security issues with lower layer + indications in PPP, IEEE 802 wired networks, and IEEE 802.11 wireless + LANs can be found in the Security Considerations, Section 7.12. + + After EAP authentication is complete, the peer will typically + transmit and receive data via the authenticator. It is desirable to + provide assurance that the entities transmitting data are the same + ones that successfully completed EAP authentication. To accomplish + + + +Aboba, et al. Standards Track [Page 19] + +RFC 3748 EAP June 2004 + + + this, it is necessary for the lower layer to provide per-packet + integrity, authentication and replay protection, and to bind these + per-packet services to the keys derived during EAP authentication. + Otherwise, it is possible for subsequent data traffic to be modified, + spoofed, or replayed. + + Where keying material for the lower layer ciphersuite is itself + provided by EAP, ciphersuite negotiation and key activation are + controlled by the lower layer. In PPP, ciphersuites are negotiated + within ECP so that it is not possible to use keys derived from EAP + authentication until the completion of ECP. Therefore, an initial + EAP exchange cannot be protected by a PPP ciphersuite, although EAP + re-authentication can be protected. + + In IEEE 802 media, initial key activation also typically occurs after + completion of EAP authentication. Therefore an initial EAP exchange + typically cannot be protected by the lower layer ciphersuite, + although an EAP re-authentication or pre-authentication exchange can + be protected. + +4. EAP Packet Format + + A summary of the EAP packet format is shown below. The fields are + transmitted from left to right. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Code | Identifier | Length | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Data ... + +-+-+-+-+ + + Code + + The Code field is one octet and identifies the Type of EAP packet. + EAP Codes are assigned as follows: + + 1 Request + 2 Response + 3 Success + 4 Failure + + Since EAP only defines Codes 1-4, EAP packets with other codes + MUST be silently discarded by both authenticators and peers. + + + + + + +Aboba, et al. Standards Track [Page 20] + +RFC 3748 EAP June 2004 + + + Identifier + + The Identifier field is one octet and aids in matching Responses + with Requests. + + Length + + The Length field is two octets and indicates the length, in + octets, of the EAP packet including the Code, Identifier, Length, + and Data fields. Octets outside the range of the Length field + should be treated as Data Link Layer padding and MUST be ignored + upon reception. A message with the Length field set to a value + larger than the number of received octets MUST be silently + discarded. + + Data + + The Data field is zero or more octets. The format of the Data + field is determined by the Code field. + +4.1. Request and Response + + Description + + The Request packet (Code field set to 1) is sent by the + authenticator to the peer. Each Request has a Type field which + serves to indicate what is being requested. Additional Request + packets MUST be sent until a valid Response packet is received, an + optional retry counter expires, or a lower layer failure + indication is received. + + Retransmitted Requests MUST be sent with the same Identifier value + in order to distinguish them from new Requests. The content of + the data field is dependent on the Request Type. The peer MUST + send a Response packet in reply to a valid Request packet. + Responses MUST only be sent in reply to a valid Request and never + be retransmitted on a timer. + + If a peer receives a valid duplicate Request for which it has + already sent a Response, it MUST resend its original Response + without reprocessing the Request. Requests MUST be processed in + the order that they are received, and MUST be processed to their + completion before inspecting the next Request. + + A summary of the Request and Response packet format follows. The + fields are transmitted from left to right. + + + + + +Aboba, et al. Standards Track [Page 21] + +RFC 3748 EAP June 2004 + + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Code | Identifier | Length | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type | Type-Data ... + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- + + Code + + 1 for Request + 2 for Response + + Identifier + + The Identifier field is one octet. The Identifier field MUST be + the same if a Request packet is retransmitted due to a timeout + while waiting for a Response. Any new (non-retransmission) + Requests MUST modify the Identifier field. + + The Identifier field of the Response MUST match that of the + currently outstanding Request. An authenticator receiving a + Response whose Identifier value does not match that of the + currently outstanding Request MUST silently discard the Response. + + In order to avoid confusion between new Requests and + retransmissions, the Identifier value chosen for each new Request + need only be different from the previous Request, but need not be + unique within the conversation. One way to achieve this is to + start the Identifier at an initial value and increment it for each + new Request. Initializing the first Identifier with a random + number rather than starting from zero is recommended, since it + makes sequence attacks somewhat more difficult. + + Since the Identifier space is unique to each session, + authenticators are not restricted to only 256 simultaneous + authentication conversations. Similarly, with re-authentication, + an EAP conversation might continue over a long period of time, and + is not limited to only 256 roundtrips. + + Implementation Note: The authenticator is responsible for + retransmitting Request messages. If the Request message is obtained + from elsewhere (such as from a backend authentication server), then + the authenticator will need to save a copy of the Request in order to + accomplish this. The peer is responsible for detecting and handling + duplicate Request messages before processing them in any way, + including passing them on to an outside party. The authenticator is + also responsible for discarding Response messages with a non-matching + + + +Aboba, et al. Standards Track [Page 22] + +RFC 3748 EAP June 2004 + + + Identifier value before acting on them in any way, including passing + them on to the backend authentication server for verification. Since + the authenticator can retransmit before receiving a Response from the + peer, the authenticator can receive multiple Responses, each with a + matching Identifier. Until a new Request is received by the + authenticator, the Identifier value is not updated, so that the + authenticator forwards Responses to the backend authentication + server, one at a time. + + Length + + The Length field is two octets and indicates the length of the EAP + packet including the Code, Identifier, Length, Type, and Type-Data + fields. Octets outside the range of the Length field should be + treated as Data Link Layer padding and MUST be ignored upon + reception. A message with the Length field set to a value larger + than the number of received octets MUST be silently discarded. + + Type + + The Type field is one octet. This field indicates the Type of + Request or Response. A single Type MUST be specified for each EAP + Request or Response. An initial specification of Types follows in + Section 5 of this document. + + The Type field of a Response MUST either match that of the + Request, or correspond to a legacy or Expanded Nak (see Section + 5.3) indicating that a Request Type is unacceptable to the peer. + A peer MUST NOT send a Nak (legacy or expanded) in response to a + Request, after an initial non-Nak Response has been sent. An EAP + server receiving a Response not meeting these requirements MUST + silently discard it. + + Type-Data + + The Type-Data field varies with the Type of Request and the + associated Response. + +4.2. Success and Failure + + The Success packet is sent by the authenticator to the peer after + completion of an EAP authentication method (Type 4 or greater) to + indicate that the peer has authenticated successfully to the + authenticator. The authenticator MUST transmit an EAP packet with + the Code field set to 3 (Success). If the authenticator cannot + authenticate the peer (unacceptable Responses to one or more + Requests), then after unsuccessful completion of the EAP method in + progress, the implementation MUST transmit an EAP packet with the + + + +Aboba, et al. Standards Track [Page 23] + +RFC 3748 EAP June 2004 + + + Code field set to 4 (Failure). An authenticator MAY wish to issue + multiple Requests before sending a Failure response in order to allow + for human typing mistakes. Success and Failure packets MUST NOT + contain additional data. + + Success and Failure packets MUST NOT be sent by an EAP authenticator + if the specification of the given method does not explicitly permit + the method to finish at that point. A peer EAP implementation + receiving a Success or Failure packet where sending one is not + explicitly permitted MUST silently discard it. By default, an EAP + peer MUST silently discard a "canned" Success packet (a Success + packet sent immediately upon connection). This ensures that a rogue + authenticator will not be able to bypass mutual authentication by + sending a Success packet prior to conclusion of the EAP method + conversation. + + Implementation Note: Because the Success and Failure packets are not + acknowledged, they are not retransmitted by the authenticator, and + may be potentially lost. A peer MUST allow for this circumstance as + described in this note. See also Section 3.4 for guidance on the + processing of lower layer success and failure indications. + + As described in Section 2.1, only a single EAP authentication method + is allowed within an EAP conversation. EAP methods may implement + result indications. After the authenticator sends a failure result + indication to the peer, regardless of the response from the peer, it + MUST subsequently send a Failure packet. After the authenticator + sends a success result indication to the peer and receives a success + result indication from the peer, it MUST subsequently send a Success + packet. + + On the peer, once the method completes unsuccessfully (that is, + either the authenticator sends a failure result indication, or the + peer decides that it does not want to continue the conversation, + possibly after sending a failure result indication), the peer MUST + terminate the conversation and indicate failure to the lower layer. + The peer MUST silently discard Success packets and MAY silently + discard Failure packets. As a result, loss of a Failure packet need + not result in a timeout. + + On the peer, after success result indications have been exchanged by + both sides, a Failure packet MUST be silently discarded. The peer + MAY, in the event that an EAP Success is not received, conclude that + the EAP Success packet was lost and that authentication concluded + successfully. + + + + + + +Aboba, et al. Standards Track [Page 24] + +RFC 3748 EAP June 2004 + + + If the authenticator has not sent a result indication, and the peer + is willing to continue the conversation, the peer waits for a Success + or Failure packet once the method completes, and MUST NOT silently + discard either of them. In the event that neither a Success nor + Failure packet is received, the peer SHOULD terminate the + conversation to avoid lengthy timeouts in case the lost packet was an + EAP Failure. + + If the peer attempts to authenticate to the authenticator and fails + to do so, the authenticator MUST send a Failure packet and MUST NOT + grant access by sending a Success packet. However, an authenticator + MAY omit having the peer authenticate to it in situations where + limited access is offered (e.g., guest access). In this case, the + authenticator MUST send a Success packet. + + Where the peer authenticates successfully to the authenticator, but + the authenticator does not send a result indication, the + authenticator MAY deny access by sending a Failure packet where the + peer is not currently authorized for network access. + + A summary of the Success and Failure packet format is shown below. + The fields are transmitted from left to right. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Code | Identifier | Length | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Code + + 3 for Success + 4 for Failure + + Identifier + + The Identifier field is one octet and aids in matching replies to + Responses. The Identifier field MUST match the Identifier field + of the Response packet that it is sent in response to. + + Length + + 4 + + + + + + + + +Aboba, et al. Standards Track [Page 25] + +RFC 3748 EAP June 2004 + + +4.3. Retransmission Behavior + + Because the authentication process will often involve user input, + some care must be taken when deciding upon retransmission strategies + and authentication timeouts. By default, where EAP is run over an + unreliable lower layer, the EAP retransmission timer SHOULD be + dynamically estimated. A maximum of 3-5 retransmissions is + suggested. + + When run over a reliable lower layer (e.g., EAP over ISAKMP/TCP, as + within [PIC]), the authenticator retransmission timer SHOULD be set + to an infinite value, so that retransmissions do not occur at the EAP + layer. The peer may still maintain a timeout value so as to avoid + waiting indefinitely for a Request. + + Where the authentication process requires user input, the measured + round trip times may be determined by user responsiveness rather than + network characteristics, so that dynamic RTO estimation may not be + helpful. Instead, the retransmission timer SHOULD be set so as to + provide sufficient time for the user to respond, with longer timeouts + required in certain cases, such as where Token Cards (see Section + 5.6) are involved. + + In order to provide the EAP authenticator with guidance as to the + appropriate timeout value, a hint can be communicated to the + authenticator by the backend authentication server (such as via the + RADIUS Session-Timeout attribute). + + In order to dynamically estimate the EAP retransmission timer, the + algorithms for the estimation of SRTT, RTTVAR, and RTO described in + [RFC2988] are RECOMMENDED, including use of Karn's algorithm, with + the following potential modifications: + + [a] In order to avoid synchronization behaviors that can occur with + fixed timers among distributed systems, the retransmission timer + is calculated with a jitter by using the RTO value and randomly + adding a value drawn between -RTOmin/2 and RTOmin/2. Alternative + calculations to create jitter MAY be used. These MUST be + pseudo-random. For a discussion of pseudo-random number + generation, see [RFC1750]. + + [b] When EAP is transported over a single link (as opposed to over + the Internet), smaller values of RTOinitial, RTOmin, and RTOmax + MAY be used. Recommended values are RTOinitial=1 second, + RTOmin=200ms, and RTOmax=20 seconds. + + + + + + +Aboba, et al. Standards Track [Page 26] + +RFC 3748 EAP June 2004 + + + [c] When EAP is transported over a single link (as opposed to over + the Internet), estimates MAY be done on a per-authenticator + basis, rather than a per-session basis. This enables the + retransmission estimate to make the most use of information on + link-layer behavior. + + [d] An EAP implementation MAY clear SRTT and RTTVAR after backing off + the timer multiple times, as it is likely that the current SRTT + and RTTVAR are bogus in this situation. Once SRTT and RTTVAR are + cleared, they should be initialized with the next RTT sample + taken as described in [RFC2988] equation 2.2. + +5. Initial EAP Request/Response Types + + This section defines the initial set of EAP Types used in Request/ + Response exchanges. More Types may be defined in future documents. + The Type field is one octet and identifies the structure of an EAP + Request or Response packet. The first 3 Types are considered special + case Types. + + The remaining Types define authentication exchanges. Nak (Type 3) or + Expanded Nak (Type 254) are valid only for Response packets, they + MUST NOT be sent in a Request. + + All EAP implementations MUST support Types 1-4, which are defined in + this document, and SHOULD support Type 254. Implementations MAY + support other Types defined here or in future RFCs. + + 1 Identity + 2 Notification + 3 Nak (Response only) + 4 MD5-Challenge + 5 One Time Password (OTP) + 6 Generic Token Card (GTC) + 254 Expanded Types + 255 Experimental use + + EAP methods MAY support authentication based on shared secrets. If + the shared secret is a passphrase entered by the user, + implementations MAY support entering passphrases with non-ASCII + characters. In this case, the input should be processed using an + appropriate stringprep [RFC3454] profile, and encoded in octets using + UTF-8 encoding [RFC2279]. A preliminary version of a possible + stringprep profile is described in [SASLPREP]. + + + + + + + +Aboba, et al. Standards Track [Page 27] + +RFC 3748 EAP June 2004 + + +5.1. Identity + + Description + + The Identity Type is used to query the identity of the peer. + Generally, the authenticator will issue this as the initial + Request. An optional displayable message MAY be included to + prompt the peer in the case where there is an expectation of + interaction with a user. A Response of Type 1 (Identity) SHOULD + be sent in Response to a Request with a Type of 1 (Identity). + + Some EAP implementations piggy-back various options into the + Identity Request after a NUL-character. By default, an EAP + implementation SHOULD NOT assume that an Identity Request or + Response can be larger than 1020 octets. + + It is RECOMMENDED that the Identity Response be used primarily for + routing purposes and selecting which EAP method to use. EAP + Methods SHOULD include a method-specific mechanism for obtaining + the identity, so that they do not have to rely on the Identity + Response. Identity Requests and Responses are sent in cleartext, + so an attacker may snoop on the identity, or even modify or spoof + identity exchanges. To address these threats, it is preferable + for an EAP method to include an identity exchange that supports + per-packet authentication, integrity and replay protection, and + confidentiality. The Identity Response may not be the appropriate + identity for the method; it may have been truncated or obfuscated + so as to provide privacy, or it may have been decorated for + routing purposes. Where the peer is configured to only accept + authentication methods supporting protected identity exchanges, + the peer MAY provide an abbreviated Identity Response (such as + omitting the peer-name portion of the NAI [RFC2486]). For further + discussion of identity protection, see Section 7.3. + + Implementation Note: The peer MAY obtain the Identity via user input. + It is suggested that the authenticator retry the Identity Request in + the case of an invalid Identity or authentication failure to allow + for potential typos on the part of the user. It is suggested that + the Identity Request be retried a minimum of 3 times before + terminating the authentication. The Notification Request MAY be used + to indicate an invalid authentication attempt prior to transmitting a + new Identity Request (optionally, the failure MAY be indicated within + the message of the new Identity Request itself). + + + + + + + + +Aboba, et al. Standards Track [Page 28] + +RFC 3748 EAP June 2004 + + + Type + + 1 + + Type-Data + + This field MAY contain a displayable message in the Request, + containing UTF-8 encoded ISO 10646 characters [RFC2279]. Where + the Request contains a null, only the portion of the field prior + to the null is displayed. If the Identity is unknown, the + Identity Response field should be zero bytes in length. The + Identity Response field MUST NOT be null terminated. In all + cases, the length of the Type-Data field is derived from the + Length field of the Request/Response packet. + + Security Claims (see Section 7.2): + + Auth. mechanism: None + Ciphersuite negotiation: No + Mutual authentication: No + Integrity protection: No + Replay protection: No + Confidentiality: No + Key derivation: No + Key strength: N/A + Dictionary attack prot.: N/A + Fast reconnect: No + Crypt. binding: N/A + Session independence: N/A + Fragmentation: No + Channel binding: No + +5.2. Notification + + Description + + The Notification Type is optionally used to convey a displayable + message from the authenticator to the peer. An authenticator MAY + send a Notification Request to the peer at any time when there is + no outstanding Request, prior to completion of an EAP + authentication method. The peer MUST respond to a Notification + Request with a Notification Response unless the EAP authentication + method specification prohibits the use of Notification messages. + In any case, a Nak Response MUST NOT be sent in response to a + Notification Request. Note that the default maximum length of a + Notification Request is 1020 octets. By default, this leaves at + most 1015 octets for the human readable message. + + + + +Aboba, et al. Standards Track [Page 29] + +RFC 3748 EAP June 2004 + + + An EAP method MAY indicate within its specification that + Notification messages must not be sent during that method. In + this case, the peer MUST silently discard Notification Requests + from the point where an initial Request for that Type is answered + with a Response of the same Type. + + The peer SHOULD display this message to the user or log it if it + cannot be displayed. The Notification Type is intended to provide + an acknowledged notification of some imperative nature, but it is + not an error indication, and therefore does not change the state + of the peer. Examples include a password with an expiration time + that is about to expire, an OTP sequence integer which is nearing + 0, an authentication failure warning, etc. In most circumstances, + Notification should not be required. + + Type + + 2 + + Type-Data + + The Type-Data field in the Request contains a displayable message + greater than zero octets in length, containing UTF-8 encoded ISO + 10646 characters [RFC2279]. The length of the message is + determined by the Length field of the Request packet. The message + MUST NOT be null terminated. A Response MUST be sent in reply to + the Request with a Type field of 2 (Notification). The Type-Data + field of the Response is zero octets in length. The Response + should be sent immediately (independent of how the message is + displayed or logged). + + Security Claims (see Section 7.2): + + Auth. mechanism: None + Ciphersuite negotiation: No + Mutual authentication: No + Integrity protection: No + Replay protection: No + Confidentiality: No + Key derivation: No + Key strength: N/A + Dictionary attack prot.: N/A + Fast reconnect: No + Crypt. binding: N/A + Session independence: N/A + Fragmentation: No + Channel binding: No + + + + +Aboba, et al. Standards Track [Page 30] + +RFC 3748 EAP June 2004 + + +5.3. Nak + +5.3.1. Legacy Nak + + Description + + The legacy Nak Type is valid only in Response messages. It is + sent in reply to a Request where the desired authentication Type + is unacceptable. Authentication Types are numbered 4 and above. + The Response contains one or more authentication Types desired by + the Peer. Type zero (0) is used to indicate that the sender has + no viable alternatives, and therefore the authenticator SHOULD NOT + send another Request after receiving a Nak Response containing a + zero value. + + Since the legacy Nak Type is valid only in Responses and has very + limited functionality, it MUST NOT be used as a general purpose + error indication, such as for communication of error messages, or + negotiation of parameters specific to a particular EAP method. + + Code + + 2 for Response. + + Identifier + + The Identifier field is one octet and aids in matching Responses + with Requests. The Identifier field of a legacy Nak Response MUST + match the Identifier field of the Request packet that it is sent + in response to. + + Length + + >=6 + + Type + + 3 + + Type-Data + + Where a peer receives a Request for an unacceptable authentication + Type (4-253,255), or a peer lacking support for Expanded Types + receives a Request for Type 254, a Nak Response (Type 3) MUST be + sent. The Type-Data field of the Nak Response (Type 3) MUST + contain one or more octets indicating the desired authentication + Type(s), one octet per Type, or the value zero (0) to indicate no + proposed alternative. A peer supporting Expanded Types that + + + +Aboba, et al. Standards Track [Page 31] + +RFC 3748 EAP June 2004 + + + receives a Request for an unacceptable authentication Type (4-253, + 255) MAY include the value 254 in the Nak Response (Type 3) to + indicate the desire for an Expanded authentication Type. If the + authenticator can accommodate this preference, it will respond + with an Expanded Type Request (Type 254). + + Security Claims (see Section 7.2): + + Auth. mechanism: None + Ciphersuite negotiation: No + Mutual authentication: No + Integrity protection: No + Replay protection: No + Confidentiality: No + Key derivation: No + Key strength: N/A + Dictionary attack prot.: N/A + Fast reconnect: No + Crypt. binding: N/A + Session independence: N/A + Fragmentation: No + Channel binding: No + + +5.3.2. Expanded Nak + + Description + + The Expanded Nak Type is valid only in Response messages. It MUST + be sent only in reply to a Request of Type 254 (Expanded Type) + where the authentication Type is unacceptable. The Expanded Nak + Type uses the Expanded Type format itself, and the Response + contains one or more authentication Types desired by the peer, all + in Expanded Type format. Type zero (0) is used to indicate that + the sender has no viable alternatives. The general format of the + Expanded Type is described in Section 5.7. + + Since the Expanded Nak Type is valid only in Responses and has + very limited functionality, it MUST NOT be used as a general + purpose error indication, such as for communication of error + messages, or negotiation of parameters specific to a particular + EAP method. + + Code + + 2 for Response. + + + + + +Aboba, et al. Standards Track [Page 32] + +RFC 3748 EAP June 2004 + + + Identifier + + The Identifier field is one octet and aids in matching Responses + with Requests. The Identifier field of an Expanded Nak Response + MUST match the Identifier field of the Request packet that it is + sent in response to. + + Length + + >=20 + + Type + + 254 + + Vendor-Id + + 0 (IETF) + + Vendor-Type + + 3 (Nak) + + Vendor-Data + + The Expanded Nak Type is only sent when the Request contains an + Expanded Type (254) as defined in Section 5.7. The Vendor-Data + field of the Nak Response MUST contain one or more authentication + Types (4 or greater), all in expanded format, 8 octets per Type, + or the value zero (0), also in Expanded Type format, to indicate + no proposed alternative. The desired authentication Types may + include a mixture of Vendor-Specific and IETF Types. For example, + an Expanded Nak Response indicating a preference for OTP (Type 5), + and an MIT (Vendor-Id=20) Expanded Type of 6 would appear as + follows: + + + + + + + + + + + + + + + + +Aboba, et al. Standards Track [Page 33] + +RFC 3748 EAP June 2004 + + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | 2 | Identifier | Length=28 | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type=254 | 0 (IETF) | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | 3 (Nak) | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type=254 | 0 (IETF) | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | 5 (OTP) | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type=254 | 20 (MIT) | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | 6 | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + An Expanded Nak Response indicating a no desired alternative would + appear as follows: + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | 2 | Identifier | Length=20 | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type=254 | 0 (IETF) | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | 3 (Nak) | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type=254 | 0 (IETF) | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | 0 (No alternative) | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Security Claims (see Section 7.2): + + Auth. mechanism: None + Ciphersuite negotiation: No + Mutual authentication: No + Integrity protection: No + Replay protection: No + Confidentiality: No + Key derivation: No + Key strength: N/A + Dictionary attack prot.: N/A + Fast reconnect: No + Crypt. binding: N/A + + + +Aboba, et al. Standards Track [Page 34] + +RFC 3748 EAP June 2004 + + + Session independence: N/A + Fragmentation: No + Channel binding: No + + +5.4. MD5-Challenge + + Description + + The MD5-Challenge Type is analogous to the PPP CHAP protocol + [RFC1994] (with MD5 as the specified algorithm). The Request + contains a "challenge" message to the peer. A Response MUST be + sent in reply to the Request. The Response MAY be either of Type + 4 (MD5-Challenge), Nak (Type 3), or Expanded Nak (Type 254). The + Nak reply indicates the peer's desired authentication Type(s). + EAP peer and EAP server implementations MUST support the MD5- + Challenge mechanism. An authenticator that supports only pass- + through MUST allow communication with a backend authentication + server that is capable of supporting MD5-Challenge, although the + EAP authenticator implementation need not support MD5-Challenge + itself. However, if the EAP authenticator can be configured to + authenticate peers locally (e.g., not operate in pass-through), + then the requirement for support of the MD5-Challenge mechanism + applies. + + Note that the use of the Identifier field in the MD5-Challenge + Type is different from that described in [RFC1994]. EAP allows + for retransmission of MD5-Challenge Request packets, while + [RFC1994] states that both the Identifier and Challenge fields + MUST change each time a Challenge (the CHAP equivalent of the + MD5-Challenge Request packet) is sent. + + Note: [RFC1994] treats the shared secret as an octet string, and + does not specify how it is entered into the system (or if it is + handled by the user at all). EAP MD5-Challenge implementations + MAY support entering passphrases with non-ASCII characters. See + Section 5 for instructions how the input should be processed and + encoded into octets. + + Type + + 4 + + Type-Data + + The contents of the Type-Data field is summarized below. For + reference on the use of these fields, see the PPP Challenge + Handshake Authentication Protocol [RFC1994]. + + + +Aboba, et al. Standards Track [Page 35] + +RFC 3748 EAP June 2004 + + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Value-Size | Value ... + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Name ... + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Security Claims (see Section 7.2): + + Auth. mechanism: Password or pre-shared key. + Ciphersuite negotiation: No + Mutual authentication: No + Integrity protection: No + Replay protection: No + Confidentiality: No + Key derivation: No + Key strength: N/A + Dictionary attack prot.: No + Fast reconnect: No + Crypt. binding: N/A + Session independence: N/A + Fragmentation: No + Channel binding: No + +5.5. One-Time Password (OTP) + + Description + + The One-Time Password system is defined in "A One-Time Password + System" [RFC2289] and "OTP Extended Responses" [RFC2243]. The + Request contains an OTP challenge in the format described in + [RFC2289]. A Response MUST be sent in reply to the Request. The + Response MUST be of Type 5 (OTP), Nak (Type 3), or Expanded Nak + (Type 254). The Nak Response indicates the peer's desired + authentication Type(s). The EAP OTP method is intended for use + with the One-Time Password system only, and MUST NOT be used to + provide support for cleartext passwords. + + Type + + 5 + + + + + + + + + +Aboba, et al. Standards Track [Page 36] + +RFC 3748 EAP June 2004 + + + Type-Data + + The Type-Data field contains the OTP "challenge" as a displayable + message in the Request. In the Response, this field is used for + the 6 words from the OTP dictionary [RFC2289]. The messages MUST + NOT be null terminated. The length of the field is derived from + the Length field of the Request/Reply packet. + + Note: [RFC2289] does not specify how the secret pass-phrase is + entered by the user, or how the pass-phrase is converted into + octets. EAP OTP implementations MAY support entering passphrases + with non-ASCII characters. See Section 5 for instructions on how + the input should be processed and encoded into octets. + + Security Claims (see Section 7.2): + + Auth. mechanism: One-Time Password + Ciphersuite negotiation: No + Mutual authentication: No + Integrity protection: No + Replay protection: Yes + Confidentiality: No + Key derivation: No + Key strength: N/A + Dictionary attack prot.: No + Fast reconnect: No + Crypt. binding: N/A + Session independence: N/A + Fragmentation: No + Channel binding: No + + +5.6. Generic Token Card (GTC) + + Description + + The Generic Token Card Type is defined for use with various Token + Card implementations which require user input. The Request + contains a displayable message and the Response contains the Token + Card information necessary for authentication. Typically, this + would be information read by a user from the Token card device and + entered as ASCII text. A Response MUST be sent in reply to the + Request. The Response MUST be of Type 6 (GTC), Nak (Type 3), or + Expanded Nak (Type 254). The Nak Response indicates the peer's + desired authentication Type(s). The EAP GTC method is intended + for use with the Token Cards supporting challenge/response + + + + + +Aboba, et al. Standards Track [Page 37] + +RFC 3748 EAP June 2004 + + + authentication and MUST NOT be used to provide support for + cleartext passwords in the absence of a protected tunnel with + server authentication. + + Type + + 6 + + Type-Data + + The Type-Data field in the Request contains a displayable message + greater than zero octets in length. The length of the message is + determined by the Length field of the Request packet. The message + MUST NOT be null terminated. A Response MUST be sent in reply to + the Request with a Type field of 6 (Generic Token Card). The + Response contains data from the Token Card required for + authentication. The length of the data is determined by the + Length field of the Response packet. + + EAP GTC implementations MAY support entering a response with non- + ASCII characters. See Section 5 for instructions how the input + should be processed and encoded into octets. + + Security Claims (see Section 7.2): + + Auth. mechanism: Hardware token. + Ciphersuite negotiation: No + Mutual authentication: No + Integrity protection: No + Replay protection: No + Confidentiality: No + Key derivation: No + Key strength: N/A + Dictionary attack prot.: No + Fast reconnect: No + Crypt. binding: N/A + Session independence: N/A + Fragmentation: No + Channel binding: No + + +5.7. Expanded Types + + Description + + Since many of the existing uses of EAP are vendor-specific, the + Expanded method Type is available to allow vendors to support + their own Expanded Types not suitable for general usage. + + + +Aboba, et al. Standards Track [Page 38] + +RFC 3748 EAP June 2004 + + + The Expanded Type is also used to expand the global Method Type + space beyond the original 255 values. A Vendor-Id of 0 maps the + original 255 possible Types onto a space of 2^32-1 possible Types. + (Type 0 is only used in a Nak Response to indicate no acceptable + alternative). + + An implementation that supports the Expanded attribute MUST treat + EAP Types that are less than 256 equivalently, whether they appear + as a single octet or as the 32-bit Vendor-Type within an Expanded + Type where Vendor-Id is 0. Peers not equipped to interpret the + Expanded Type MUST send a Nak as described in Section 5.3.1, and + negotiate a more suitable authentication method. + + A summary of the Expanded Type format is shown below. The fields + are transmitted from left to right. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type | Vendor-Id | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Vendor-Type | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Vendor data... + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Type + + 254 for Expanded Type + + Vendor-Id + + The Vendor-Id is 3 octets and represents the SMI Network + Management Private Enterprise Code of the Vendor in network byte + order, as allocated by IANA. A Vendor-Id of zero is reserved for + use by the IETF in providing an expanded global EAP Type space. + + Vendor-Type + + The Vendor-Type field is four octets and represents the vendor- + specific method Type. + + If the Vendor-Id is zero, the Vendor-Type field is an extension + and superset of the existing namespace for EAP Types. The first + 256 Types are reserved for compatibility with single-octet EAP + Types that have already been assigned or may be assigned in the + future. Thus, EAP Types from 0 through 255 are semantically + identical, whether they appear as single octet EAP Types or as + + + +Aboba, et al. Standards Track [Page 39] + +RFC 3748 EAP June 2004 + + + Vendor-Types when Vendor-Id is zero. There is one exception to + this rule: Expanded Nak and Legacy Nak packets share the same + Type, but must be treated differently because they have a + different format. + + Vendor-Data + + The Vendor-Data field is defined by the vendor. Where a Vendor-Id + of zero is present, the Vendor-Data field will be used for + transporting the contents of EAP methods of Types defined by the + IETF. + +5.8. Experimental + + Description + + The Experimental Type has no fixed format or content. It is + intended for use when experimenting with new EAP Types. This Type + is intended for experimental and testing purposes. No guarantee + is made for interoperability between peers using this Type, as + outlined in [RFC3692]. + + Type + + 255 + + Type-Data + + Undefined + +6. IANA Considerations + + This section provides guidance to the Internet Assigned Numbers + Authority (IANA) regarding registration of values related to the EAP + protocol, in accordance with BCP 26, [RFC2434]. + + There are two name spaces in EAP that require registration: Packet + Codes and method Types. + + EAP is not intended as a general-purpose protocol, and allocations + SHOULD NOT be made for purposes unrelated to authentication. + + The following terms are used here with the meanings defined in BCP + 26: "name space", "assigned value", "registration". + + The following policies are used here with the meanings defined in BCP + 26: "Private Use", "First Come First Served", "Expert Review", + "Specification Required", "IETF Consensus", "Standards Action". + + + +Aboba, et al. Standards Track [Page 40] + +RFC 3748 EAP June 2004 + + + For registration requests where a Designated Expert should be + consulted, the responsible IESG area director should appoint the + Designated Expert. The intention is that any allocation will be + accompanied by a published RFC. But in order to allow for the + allocation of values prior to the RFC being approved for publication, + the Designated Expert can approve allocations once it seems clear + that an RFC will be published. The Designated expert will post a + request to the EAP WG mailing list (or a successor designated by the + Area Director) for comment and review, including an Internet-Draft. + Before a period of 30 days has passed, the Designated Expert will + either approve or deny the registration request and publish a notice + of the decision to the EAP WG mailing list or its successor, as well + as informing IANA. A denial notice must be justified by an + explanation, and in the cases where it is possible, concrete + suggestions on how the request can be modified so as to become + acceptable should be provided. + +6.1. Packet Codes + + Packet Codes have a range from 1 to 255, of which 1-4 have been + allocated. Because a new Packet Code has considerable impact on + interoperability, a new Packet Code requires Standards Action, and + should be allocated starting at 5. + +6.2. Method Types + + The original EAP method Type space has a range from 1 to 255, and is + the scarcest resource in EAP, and thus must be allocated with care. + Method Types 1-45 have been allocated, with 20 available for re-use. + Method Types 20 and 46-191 may be allocated on the advice of a + Designated Expert, with Specification Required. + + Allocation of blocks of method Types (more than one for a given + purpose) should require IETF Consensus. EAP Type Values 192-253 are + reserved and allocation requires Standards Action. + + Method Type 254 is allocated for the Expanded Type. Where the + Vendor-Id field is non-zero, the Expanded Type is used for functions + specific only to one vendor's implementation of EAP, where no + interoperability is deemed useful. When used with a Vendor-Id of + zero, method Type 254 can also be used to provide for an expanded + IETF method Type space. Method Type values 256-4294967295 may be + allocated after Type values 1-191 have been allocated, on the advice + of a Designated Expert, with Specification Required. + + Method Type 255 is allocated for Experimental use, such as testing of + new EAP methods before a permanent Type is allocated. + + + + +Aboba, et al. Standards Track [Page 41] + +RFC 3748 EAP June 2004 + + +7. Security Considerations + + This section defines a generic threat model as well as the EAP method + security claims mitigating those threats. + + It is expected that the generic threat model and corresponding + security claims will used to define EAP method requirements for use + in specific environments. An example of such a requirements analysis + is provided in [IEEE-802.11i-req]. A security claims section is + required in EAP method specifications, so that EAP methods can be + evaluated against the requirements. + +7.1. Threat Model + + EAP was developed for use with PPP [RFC1661] and was later adapted + for use in wired IEEE 802 networks [IEEE-802] in [IEEE-802.1X]. + Subsequently, EAP has been proposed for use on wireless LAN networks + and over the Internet. In all these situations, it is possible for + an attacker to gain access to links over which EAP packets are + transmitted. For example, attacks on telephone infrastructure are + documented in [DECEPTION]. + + An attacker with access to the link may carry out a number of + attacks, including: + + [1] An attacker may try to discover user identities by snooping + authentication traffic. + + [2] An attacker may try to modify or spoof EAP packets. + + [3] An attacker may launch denial of service attacks by spoofing + lower layer indications or Success/Failure packets, by replaying + EAP packets, or by generating packets with overlapping + Identifiers. + + [4] An attacker may attempt to recover the pass-phrase by mounting + an offline dictionary attack. + + [5] An attacker may attempt to convince the peer to connect to an + untrusted network by mounting a man-in-the-middle attack. + + [6] An attacker may attempt to disrupt the EAP negotiation in order + cause a weak authentication method to be selected. + + [7] An attacker may attempt to recover keys by taking advantage of + weak key derivation techniques used within EAP methods. + + + + + +Aboba, et al. Standards Track [Page 42] + +RFC 3748 EAP June 2004 + + + [8] An attacker may attempt to take advantage of weak ciphersuites + subsequently used after the EAP conversation is complete. + + [9] An attacker may attempt to perform downgrading attacks on lower + layer ciphersuite negotiation in order to ensure that a weaker + ciphersuite is used subsequently to EAP authentication. + + [10] An attacker acting as an authenticator may provide incorrect + information to the EAP peer and/or server via out-of-band + mechanisms (such as via a AAA or lower layer protocol). This + includes impersonating another authenticator, or providing + inconsistent information to the peer and EAP server. + + Depending on the lower layer, these attacks may be carried out + without requiring physical proximity. Where EAP is used over + wireless networks, EAP packets may be forwarded by authenticators + (e.g., pre-authentication) so that the attacker need not be within + the coverage area of an authenticator in order to carry out an attack + on it or its peers. Where EAP is used over the Internet, attacks may + be carried out at an even greater distance. + +7.2. Security Claims + + In order to clearly articulate the security provided by an EAP + method, EAP method specifications MUST include a Security Claims + section, including the following declarations: + + [a] Mechanism. This is a statement of the authentication technology: + certificates, pre-shared keys, passwords, token cards, etc. + + [b] Security claims. This is a statement of the claimed security + properties of the method, using terms defined in Section 7.2.1: + mutual authentication, integrity protection, replay protection, + confidentiality, key derivation, dictionary attack resistance, + fast reconnect, cryptographic binding. The Security Claims + section of an EAP method specification SHOULD provide + justification for the claims that are made. This can be + accomplished by including a proof in an Appendix, or including a + reference to a proof. + + [c] Key strength. If the method derives keys, then the effective key + strength MUST be estimated. This estimate is meant for potential + users of the method to determine if the keys produced are strong + enough for the intended application. + + + + + + + +Aboba, et al. Standards Track [Page 43] + +RFC 3748 EAP June 2004 + + + The effective key strength SHOULD be stated as a number of bits, + defined as follows: If the effective key strength is N bits, the + best currently known methods to recover the key (with non- + negligible probability) require, on average, an effort comparable + to 2^(N-1) operations of a typical block cipher. The statement + SHOULD be accompanied by a short rationale, explaining how this + number was derived. This explanation SHOULD include the + parameters required to achieve the stated key strength based on + current knowledge of the algorithms. + + (Note: Although it is difficult to define what "comparable + effort" and "typical block cipher" exactly mean, reasonable + approximations are sufficient here. Refer to e.g. [SILVERMAN] + for more discussion.) + + The key strength depends on the methods used to derive the keys. + For instance, if keys are derived from a shared secret (such as a + password or a long-term secret), and possibly some public + information such as nonces, the effective key strength is limited + by the strength of the long-term secret (assuming that the + derivation procedure is computationally simple). To take another + example, when using public key algorithms, the strength of the + symmetric key depends on the strength of the public keys used. + + [d] Description of key hierarchy. EAP methods deriving keys MUST + either provide a reference to a key hierarchy specification, or + describe how Master Session Keys (MSKs) and Extended Master + Session Keys (EMSKs) are to be derived. + + [e] Indication of vulnerabilities. In addition to the security + claims that are made, the specification MUST indicate which of + the security claims detailed in Section 7.2.1 are NOT being made. + +7.2.1. Security Claims Terminology for EAP Methods + + These terms are used to describe the security properties of EAP + methods: + + Protected ciphersuite negotiation + This refers to the ability of an EAP method to negotiate the + ciphersuite used to protect the EAP conversation, as well as to + integrity protect the negotiation. It does not refer to the + ability to negotiate the ciphersuite used to protect data. + + + + + + + + +Aboba, et al. Standards Track [Page 44] + +RFC 3748 EAP June 2004 + + + Mutual authentication + This refers to an EAP method in which, within an interlocked + exchange, the authenticator authenticates the peer and the peer + authenticates the authenticator. Two independent one-way methods, + running in opposite directions do not provide mutual + authentication as defined here. + + Integrity protection + This refers to providing data origin authentication and protection + against unauthorized modification of information for EAP packets + (including EAP Requests and Responses). When making this claim, a + method specification MUST describe the EAP packets and fields + within the EAP packet that are protected. + + Replay protection + This refers to protection against replay of an EAP method or its + messages, including success and failure result indications. + + Confidentiality + This refers to encryption of EAP messages, including EAP Requests + and Responses, and success and failure result indications. A + method making this claim MUST support identity protection (see + Section 7.3). + + Key derivation + This refers to the ability of the EAP method to derive exportable + keying material, such as the Master Session Key (MSK), and + Extended Master Session Key (EMSK). The MSK is used only for + further key derivation, not directly for protection of the EAP + conversation or subsequent data. Use of the EMSK is reserved. + + Key strength + If the effective key strength is N bits, the best currently known + methods to recover the key (with non-negligible probability) + require, on average, an effort comparable to 2^(N-1) operations of + a typical block cipher. + + Dictionary attack resistance + Where password authentication is used, passwords are commonly + selected from a small set (as compared to a set of N-bit keys), + which raises a concern about dictionary attacks. A method may be + said to provide protection against dictionary attacks if, when it + uses a password as a secret, the method does not allow an offline + attack that has a work factor based on the number of passwords in + an attacker's dictionary. + + + + + + +Aboba, et al. Standards Track [Page 45] + +RFC 3748 EAP June 2004 + + + Fast reconnect + The ability, in the case where a security association has been + previously established, to create a new or refreshed security + association more efficiently or in a smaller number of round- + trips. + + Cryptographic binding + The demonstration of the EAP peer to the EAP server that a single + entity has acted as the EAP peer for all methods executed within a + tunnel method. Binding MAY also imply that the EAP server + demonstrates to the peer that a single entity has acted as the EAP + server for all methods executed within a tunnel method. If + executed correctly, binding serves to mitigate man-in-the-middle + vulnerabilities. + + Session independence + The demonstration that passive attacks (such as capture of the EAP + conversation) or active attacks (including compromise of the MSK + or EMSK) does not enable compromise of subsequent or prior MSKs or + EMSKs. + + Fragmentation + This refers to whether an EAP method supports fragmentation and + reassembly. As noted in Section 3.1, EAP methods should support + fragmentation and reassembly if EAP packets can exceed the minimum + MTU of 1020 octets. + + Channel binding + The communication within an EAP method of integrity-protected + channel properties such as endpoint identifiers which can be + compared to values communicated via out of band mechanisms (such + as via a AAA or lower layer protocol). + + Note: This list of security claims is not exhaustive. Additional + properties, such as additional denial-of-service protection, may be + relevant as well. + +7.3. Identity Protection + + An Identity exchange is optional within the EAP conversation. + Therefore, it is possible to omit the Identity exchange entirely, or + to use a method-specific identity exchange once a protected channel + has been established. + + However, where roaming is supported as described in [RFC2607], it may + be necessary to locate the appropriate backend authentication server + before the authentication conversation can proceed. The realm + portion of the Network Access Identifier (NAI) [RFC2486] is typically + + + +Aboba, et al. Standards Track [Page 46] + +RFC 3748 EAP June 2004 + + + included within the EAP-Response/Identity in order to enable the + authentication exchange to be routed to the appropriate backend + authentication server. Therefore, while the peer-name portion of the + NAI may be omitted in the EAP-Response/Identity where proxies or + relays are present, the realm portion may be required. + + It is possible for the identity in the identity response to be + different from the identity authenticated by the EAP method. This + may be intentional in the case of identity privacy. An EAP method + SHOULD use the authenticated identity when making access control + decisions. + +7.4. Man-in-the-Middle Attacks + + Where EAP is tunneled within another protocol that omits peer + authentication, there exists a potential vulnerability to a man-in- + the-middle attack. For details, see [BINDING] and [MITM]. + + As noted in Section 2.1, EAP does not permit untunneled sequences of + authentication methods. Were a sequence of EAP authentication + methods to be permitted, the peer might not have proof that a single + entity has acted as the authenticator for all EAP methods within the + sequence. For example, an authenticator might terminate one EAP + method, then forward the next method in the sequence to another party + without the peer's knowledge or consent. Similarly, the + authenticator might not have proof that a single entity has acted as + the peer for all EAP methods within the sequence. + + Tunneling EAP within another protocol enables an attack by a rogue + EAP authenticator tunneling EAP to a legitimate server. Where the + tunneling protocol is used for key establishment but does not require + peer authentication, an attacker convincing a legitimate peer to + connect to it will be able to tunnel EAP packets to a legitimate + server, successfully authenticating and obtaining the key. This + allows the attacker to successfully establish itself as a man-in- + the-middle, gaining access to the network, as well as the ability to + decrypt data traffic between the legitimate peer and server. + + This attack may be mitigated by the following measures: + + [a] Requiring mutual authentication within EAP tunneling mechanisms. + + [b] Requiring cryptographic binding between the EAP tunneling + protocol and the tunneled EAP methods. Where cryptographic + binding is supported, a mechanism is also needed to protect + against downgrade attacks that would bypass it. For further + details on cryptographic binding, see [BINDING]. + + + + +Aboba, et al. Standards Track [Page 47] + +RFC 3748 EAP June 2004 + + + [c] Limiting the EAP methods authorized for use without protection, + based on peer and authenticator policy. + + [d] Avoiding the use of tunnels when a single, strong method is + available. + +7.5. Packet Modification Attacks + + While EAP methods may support per-packet data origin authentication, + integrity, and replay protection, support is not provided within the + EAP layer. + + Since the Identifier is only a single octet, it is easy to guess, + allowing an attacker to successfully inject or replay EAP packets. + An attacker may also modify EAP headers (Code, Identifier, Length, + Type) within EAP packets where the header is unprotected. This could + cause packets to be inappropriately discarded or misinterpreted. + + To protect EAP packets against modification, spoofing, or replay, + methods supporting protected ciphersuite negotiation, mutual + authentication, and key derivation, as well as integrity and replay + protection, are recommended. See Section 7.2.1 for definitions of + these security claims. + + Method-specific MICs may be used to provide protection. If a per- + packet MIC is employed within an EAP method, then peers, + authentication servers, and authenticators not operating in pass- + through mode MUST validate the MIC. MIC validation failures SHOULD + be logged. Whether a MIC validation failure is considered a fatal + error or not is determined by the EAP method specification. + + It is RECOMMENDED that methods providing integrity protection of EAP + packets include coverage of all the EAP header fields, including the + Code, Identifier, Length, Type, and Type-Data fields. + + Since EAP messages of Types Identity, Notification, and Nak do not + include their own MIC, it may be desirable for the EAP method MIC to + cover information contained within these messages, as well as the + header of each EAP message. + + To provide protection, EAP also may be encapsulated within a + protected channel created by protocols such as ISAKMP [RFC2408], as + is done in [IKEv2] or within TLS [RFC2246]. However, as noted in + Section 7.4, EAP tunneling may result in a man-in-the-middle + vulnerability. + + + + + + +Aboba, et al. Standards Track [Page 48] + +RFC 3748 EAP June 2004 + + + Existing EAP methods define message integrity checks (MICs) that + cover more than one EAP packet. For example, EAP-TLS [RFC2716] + defines a MIC over a TLS record that could be split into multiple + fragments; within the FINISHED message, the MIC is computed over + previous messages. Where the MIC covers more than one EAP packet, a + MIC validation failure is typically considered a fatal error. + + Within EAP-TLS [RFC2716], a MIC validation failure is treated as a + fatal error, since that is what is specified in TLS [RFC2246]. + However, it is also possible to develop EAP methods that support + per-packet MICs, and respond to verification failures by silently + discarding the offending packet. + + In this document, descriptions of EAP message handling assume that + per-packet MIC validation, where it occurs, is effectively performed + as though it occurs before sending any responses or changing the + state of the host which received the packet. + +7.6. Dictionary Attacks + + Password authentication algorithms such as EAP-MD5, MS-CHAPv1 + [RFC2433], and Kerberos V [RFC1510] are known to be vulnerable to + dictionary attacks. MS-CHAPv1 vulnerabilities are documented in + [PPTPv1]; MS-CHAPv2 vulnerabilities are documented in [PPTPv2]; + Kerberos vulnerabilities are described in [KRBATTACK], [KRBLIM], and + [KERB4WEAK]. + + In order to protect against dictionary attacks, authentication + methods resistant to dictionary attacks (as defined in Section 7.2.1) + are recommended. + + If an authentication algorithm is used that is known to be vulnerable + to dictionary attacks, then the conversation may be tunneled within a + protected channel in order to provide additional protection. + However, as noted in Section 7.4, EAP tunneling may result in a man- + in-the-middle vulnerability, and therefore dictionary attack + resistant methods are preferred. + +7.7. Connection to an Untrusted Network + + With EAP methods supporting one-way authentication, such as EAP-MD5, + the peer does not authenticate the authenticator, making the peer + vulnerable to attack by a rogue authenticator. Methods supporting + mutual authentication (as defined in Section 7.2.1) address this + vulnerability. + + In EAP there is no requirement that authentication be full duplex or + that the same protocol be used in both directions. It is perfectly + + + +Aboba, et al. Standards Track [Page 49] + +RFC 3748 EAP June 2004 + + + acceptable for different protocols to be used in each direction. + This will, of course, depend on the specific protocols negotiated. + However, in general, completing a single unitary mutual + authentication is preferable to two one-way authentications, one in + each direction. This is because separate authentications that are + not bound cryptographically so as to demonstrate they are part of the + same session are subject to man-in-the-middle attacks, as discussed + in Section 7.4. + +7.8. Negotiation Attacks + + In a negotiation attack, the attacker attempts to convince the peer + and authenticator to negotiate a less secure EAP method. EAP does + not provide protection for Nak Response packets, although it is + possible for a method to include coverage of Nak Responses within a + method-specific MIC. + + Within or associated with each authenticator, it is not anticipated + that a particular named peer will support a choice of methods. This + would make the peer vulnerable to attacks that negotiate the least + secure method from among a set. Instead, for each named peer, there + SHOULD be an indication of exactly one method used to authenticate + that peer name. If a peer needs to make use of different + authentication methods under different circumstances, then distinct + identities SHOULD be employed, each of which identifies exactly one + authentication method. + +7.9. Implementation Idiosyncrasies + + The interaction of EAP with lower layers such as PPP and IEEE 802 are + highly implementation dependent. + + For example, upon failure of authentication, some PPP implementations + do not terminate the link, instead limiting traffic in Network-Layer + Protocols to a filtered subset, which in turn allows the peer the + opportunity to update secrets or send mail to the network + administrator indicating a problem. Similarly, while an + authentication failure will result in denied access to the controlled + port in [IEEE-802.1X], limited traffic may be permitted on the + uncontrolled port. + + In EAP there is no provision for retries of failed authentication. + However, in PPP the LCP state machine can renegotiate the + authentication protocol at any time, thus allowing a new attempt. + Similarly, in IEEE 802.1X the Supplicant or Authenticator can re- + authenticate at any time. It is recommended that any counters used + for authentication failure not be reset until after successful + authentication, or subsequent termination of the failed link. + + + +Aboba, et al. Standards Track [Page 50] + +RFC 3748 EAP June 2004 + + +7.10. Key Derivation + + It is possible for the peer and EAP server to mutually authenticate + and derive keys. In order to provide keying material for use in a + subsequently negotiated ciphersuite, an EAP method supporting key + derivation MUST export a Master Session Key (MSK) of at least 64 + octets, and an Extended Master Session Key (EMSK) of at least 64 + octets. EAP Methods deriving keys MUST provide for mutual + authentication between the EAP peer and the EAP Server. + + The MSK and EMSK MUST NOT be used directly to protect data; however, + they are of sufficient size to enable derivation of a AAA-Key + subsequently used to derive Transient Session Keys (TSKs) for use + with the selected ciphersuite. Each ciphersuite is responsible for + specifying how to derive the TSKs from the AAA-Key. + + The AAA-Key is derived from the keying material exported by the EAP + method (MSK and EMSK). This derivation occurs on the AAA server. In + many existing protocols that use EAP, the AAA-Key and MSK are + equivalent, but more complicated mechanisms are possible (see + [KEYFRAME] for details). + + EAP methods SHOULD ensure the freshness of the MSK and EMSK, even in + cases where one party may not have a high quality random number + generator. A RECOMMENDED method is for each party to provide a nonce + of at least 128 bits, used in the derivation of the MSK and EMSK. + + EAP methods export the MSK and EMSK, but not Transient Session Keys + so as to allow EAP methods to be ciphersuite and media independent. + Keying material exported by EAP methods MUST be independent of the + ciphersuite negotiated to protect data. + + Depending on the lower layer, EAP methods may run before or after + ciphersuite negotiation, so that the selected ciphersuite may not be + known to the EAP method. By providing keying material usable with + any ciphersuite, EAP methods can used with a wide range of + ciphersuites and media. + + In order to preserve algorithm independence, EAP methods deriving + keys SHOULD support (and document) the protected negotiation of the + ciphersuite used to protect the EAP conversation between the peer and + server. This is distinct from the ciphersuite negotiated between the + peer and authenticator, used to protect data. + + The strength of Transient Session Keys (TSKs) used to protect data is + ultimately dependent on the strength of keys generated by the EAP + method. If an EAP method cannot produce keying material of + sufficient strength, then the TSKs may be subject to a brute force + + + +Aboba, et al. Standards Track [Page 51] + +RFC 3748 EAP June 2004 + + + attack. In order to enable deployments requiring strong keys, EAP + methods supporting key derivation SHOULD be capable of generating an + MSK and EMSK, each with an effective key strength of at least 128 + bits. + + Methods supporting key derivation MUST demonstrate cryptographic + separation between the MSK and EMSK branches of the EAP key + hierarchy. Without violating a fundamental cryptographic assumption + (such as the non-invertibility of a one-way function), an attacker + recovering the MSK or EMSK MUST NOT be able to recover the other + quantity with a level of effort less than brute force. + + Non-overlapping substrings of the MSK MUST be cryptographically + separate from each other, as defined in Section 7.2.1. That is, + knowledge of one substring MUST NOT help in recovering some other + substring without breaking some hard cryptographic assumption. This + is required because some existing ciphersuites form TSKs by simply + splitting the AAA-Key to pieces of appropriate length. Likewise, + non-overlapping substrings of the EMSK MUST be cryptographically + separate from each other, and from substrings of the MSK. + + The EMSK is reserved for future use and MUST remain on the EAP peer + and EAP server where it is derived; it MUST NOT be transported to, or + shared with, additional parties, or used to derive any other keys. + (This restriction will be relaxed in a future document that specifies + how the EMSK can be used.) + + Since EAP does not provide for explicit key lifetime negotiation, EAP + peers, authenticators, and authentication servers MUST be prepared + for situations in which one of the parties discards the key state, + which remains valid on another party. + + This specification does not provide detailed guidance on how EAP + methods derive the MSK and EMSK, how the AAA-Key is derived from the + MSK and/or EMSK, or how the TSKs are derived from the AAA-Key. + + The development and validation of key derivation algorithms is + difficult, and as a result, EAP methods SHOULD re-use well + established and analyzed mechanisms for key derivation (such as those + specified in IKE [RFC2409] or TLS [RFC2246]), rather than inventing + new ones. EAP methods SHOULD also utilize well established and + analyzed mechanisms for MSK and EMSK derivation. Further details on + EAP Key Derivation are provided within [KEYFRAME]. + + + + + + + + +Aboba, et al. Standards Track [Page 52] + +RFC 3748 EAP June 2004 + + +7.11. Weak Ciphersuites + + If after the initial EAP authentication, data packets are sent + without per-packet authentication, integrity, and replay protection, + an attacker with access to the media can inject packets, "flip bits" + within existing packets, replay packets, or even hijack the session + completely. Without per-packet confidentiality, it is possible to + snoop data packets. + + To protect against data modification, spoofing, or snooping, it is + recommended that EAP methods supporting mutual authentication and key + derivation (as defined by Section 7.2.1) be used, along with lower + layers providing per-packet confidentiality, authentication, + integrity, and replay protection. + + Additionally, if the lower layer performs ciphersuite negotiation, it + should be understood that EAP does not provide by itself integrity + protection of that negotiation. Therefore, in order to avoid + downgrading attacks which would lead to weaker ciphersuites being + used, clients implementing lower layer ciphersuite negotiation SHOULD + protect against negotiation downgrading. + + This can be done by enabling users to configure which ciphersuites + are acceptable as a matter of security policy, or the ciphersuite + negotiation MAY be authenticated using keying material derived from + the EAP authentication and a MIC algorithm agreed upon in advance by + lower-layer peers. + +7.12. Link Layer + + There are reliability and security issues with link layer indications + in PPP, IEEE 802 LANs, and IEEE 802.11 wireless LANs: + + [a] PPP. In PPP, link layer indications such as LCP-Terminate (a + link failure indication) and NCP (a link success indication) are + not authenticated or integrity protected. They can therefore be + spoofed by an attacker with access to the link. + + [b] IEEE 802. IEEE 802.1X EAPOL-Start and EAPOL-Logoff frames are + not authenticated or integrity protected. They can therefore be + spoofed by an attacker with access to the link. + + [c] IEEE 802.11. In IEEE 802.11, link layer indications include + Disassociate and Deauthenticate frames (link failure + indications), and the first message of the 4-way handshake (link + success indication). These messages are not authenticated or + integrity protected, and although they are not forwardable, they + are spoofable by an attacker within range. + + + +Aboba, et al. Standards Track [Page 53] + +RFC 3748 EAP June 2004 + + + In IEEE 802.11, IEEE 802.1X data frames may be sent as Class 3 + unicast data frames, and are therefore forwardable. This implies + that while EAPOL-Start and EAPOL-Logoff messages may be authenticated + and integrity protected, they can be spoofed by an authenticated + attacker far from the target when "pre-authentication" is enabled. + + In IEEE 802.11, a "link down" indication is an unreliable indication + of link failure, since wireless signal strength can come and go and + may be influenced by radio frequency interference generated by an + attacker. To avoid unnecessary resets, it is advisable to damp these + indications, rather than passing them directly to the EAP. Since EAP + supports retransmission, it is robust against transient connectivity + losses. + +7.13. Separation of Authenticator and Backend Authentication Server + + It is possible for the EAP peer and EAP server to mutually + authenticate and derive a AAA-Key for a ciphersuite used to protect + subsequent data traffic. This does not present an issue on the peer, + since the peer and EAP client reside on the same machine; all that is + required is for the client to derive the AAA-Key from the MSK and + EMSK exported by the EAP method, and to subsequently pass a Transient + Session Key (TSK) to the ciphersuite module. + + However, in the case where the authenticator and authentication + server reside on different machines, there are several implications + for security. + + [a] Authentication will occur between the peer and the authentication + server, not between the peer and the authenticator. This means + that it is not possible for the peer to validate the identity of + the authenticator that it is speaking to, using EAP alone. + + [b] As discussed in [RFC3579], the authenticator is dependent on the + AAA protocol in order to know the outcome of an authentication + conversation, and does not look at the encapsulated EAP packet + (if one is present) to determine the outcome. In practice, this + implies that the AAA protocol spoken between the authenticator + and authentication server MUST support per-packet authentication, + integrity, and replay protection. + + [c] After completion of the EAP conversation, where lower layer + security services such as per-packet confidentiality, + authentication, integrity, and replay protection will be enabled, + a secure association protocol SHOULD be run between the peer and + authenticator in order to provide mutual authentication between + + + + + +Aboba, et al. Standards Track [Page 54] + +RFC 3748 EAP June 2004 + + + the peer and authenticator, guarantee liveness of transient + session keys, provide protected ciphersuite and capabilities + negotiation for subsequent data, and synchronize key usage. + + [d] A AAA-Key derived from the MSK and/or EMSK negotiated between the + peer and authentication server MAY be transmitted to the + authenticator. Therefore, a mechanism needs to be provided to + transmit the AAA-Key from the authentication server to the + authenticator that needs it. The specification of the AAA-key + derivation, transport, and wrapping mechanisms is outside the + scope of this document. Further details on AAA-Key Derivation + are provided within [KEYFRAME]. + +7.14. Cleartext Passwords + + This specification does not define a mechanism for cleartext password + authentication. The omission is intentional. Use of cleartext + passwords would allow the password to be captured by an attacker with + access to a link over which EAP packets are transmitted. + + Since protocols encapsulating EAP, such as RADIUS [RFC3579], may not + provide confidentiality, EAP packets may be subsequently encapsulated + for transport over the Internet where they may be captured by an + attacker. + + As a result, cleartext passwords cannot be securely used within EAP, + except where encapsulated within a protected tunnel with server + authentication. Some of the same risks apply to EAP methods without + dictionary attack resistance, as defined in Section 7.2.1. For + details, see Section 7.6. + +7.15. Channel Binding + + It is possible for a compromised or poorly implemented EAP + authenticator to communicate incorrect information to the EAP peer + and/or server. This may enable an authenticator to impersonate + another authenticator or communicate incorrect information via out- + of-band mechanisms (such as via a AAA or lower layer protocol). + + Where EAP is used in pass-through mode, the EAP peer typically does + not verify the identity of the pass-through authenticator, it only + verifies that the pass-through authenticator is trusted by the EAP + server. This creates a potential security vulnerability. + + Section 4.3.7 of [RFC3579] describes how an EAP pass-through + authenticator acting as a AAA client can be detected if it attempts + to impersonate another authenticator (such by sending incorrect NAS- + Identifier [RFC2865], NAS-IP-Address [RFC2865] or NAS-IPv6-Address + + + +Aboba, et al. Standards Track [Page 55] + +RFC 3748 EAP June 2004 + + + [RFC3162] attributes via the AAA protocol). However, it is possible + for a pass-through authenticator acting as a AAA client to provide + correct information to the AAA server while communicating misleading + information to the EAP peer via a lower layer protocol. + + For example, it is possible for a compromised authenticator to + utilize another authenticator's Called-Station-Id or NAS-Identifier + in communicating with the EAP peer via a lower layer protocol, or for + a pass-through authenticator acting as a AAA client to provide an + incorrect peer Calling-Station-Id [RFC2865][RFC3580] to the AAA + server via the AAA protocol. + + In order to address this vulnerability, EAP methods may support a + protected exchange of channel properties such as endpoint + identifiers, including (but not limited to): Called-Station-Id + [RFC2865][RFC3580], Calling-Station-Id [RFC2865][RFC3580], NAS- + Identifier [RFC2865], NAS-IP-Address [RFC2865], and NAS-IPv6-Address + [RFC3162]. + + Using such a protected exchange, it is possible to match the channel + properties provided by the authenticator via out-of-band mechanisms + against those exchanged within the EAP method. Where discrepancies + are found, these SHOULD be logged; additional actions MAY also be + taken, such as denying access. + +7.16. Protected Result Indications + + Within EAP, Success and Failure packets are neither acknowledged nor + integrity protected. Result indications improve resilience to loss + of Success and Failure packets when EAP is run over lower layers + which do not support retransmission or synchronization of the + authentication state. In media such as IEEE 802.11, which provides + for retransmission, as well as synchronization of authentication + state via the 4-way handshake defined in [IEEE-802.11i], additional + resilience is typically of marginal benefit. + + Depending on the method and circumstances, result indications can be + spoofable by an attacker. A method is said to provide protected + result indications if it supports result indications, as well as the + "integrity protection" and "replay protection" claims. A method + supporting protected result indications MUST indicate which result + indications are protected, and which are not. + + Protected result indications are not required to protect against + rogue authenticators. Within a mutually authenticating method, + requiring that the server authenticate to the peer before the peer + will accept a Success packet prevents an attacker from acting as a + rogue authenticator. + + + +Aboba, et al. Standards Track [Page 56] + +RFC 3748 EAP June 2004 + + + However, it is possible for an attacker to forge a Success packet + after the server has authenticated to the peer, but before the peer + has authenticated to the server. If the peer were to accept the + forged Success packet and attempt to access the network when it had + not yet successfully authenticated to the server, a denial of service + attack could be mounted against the peer. After such an attack, if + the lower layer supports failure indications, the authenticator can + synchronize state with the peer by providing a lower layer failure + indication. See Section 7.12 for details. + + If a server were to authenticate the peer and send a Success packet + prior to determining whether the peer has authenticated the + authenticator, an idle timeout can occur if the authenticator is not + authenticated by the peer. Where supported by the lower layer, an + authenticator sensing the absence of the peer can free resources. + + In a method supporting result indications, a peer that has + authenticated the server does not consider the authentication + successful until it receives an indication that the server + successfully authenticated it. Similarly, a server that has + successfully authenticated the peer does not consider the + authentication successful until it receives an indication that the + peer has authenticated the server. + + In order to avoid synchronization problems, prior to sending a + success result indication, it is desirable for the sender to verify + that sufficient authorization exists for granting access, though, as + discussed below, this is not always possible. + + While result indications may enable synchronization of the + authentication result between the peer and server, this does not + guarantee that the peer and authenticator will be synchronized in + terms of their authorization or that timeouts will not occur. For + example, the EAP server may not be aware of an authorization decision + made by a AAA proxy; the AAA server may check authorization only + after authentication has completed successfully, to discover that + authorization cannot be granted, or the AAA server may grant access + but the authenticator may be unable to provide it due to a temporary + lack of resources. In these situations, synchronization may only be + achieved via lower layer result indications. + + Success indications may be explicit or implicit. For example, where + a method supports error messages, an implicit success indication may + be defined as the reception of a specific message without a preceding + error message. Failures are typically indicated explicitly. As + described in Section 4.2, a peer silently discards a Failure packet + received at a point where the method does not explicitly permit this + + + + +Aboba, et al. Standards Track [Page 57] + +RFC 3748 EAP June 2004 + + + to be sent. For example, a method providing its own error messages + might require the peer to receive an error message prior to accepting + a Failure packet. + + Per-packet authentication, integrity, and replay protection of result + indications protects against spoofing. Since protected result + indications require use of a key for per-packet authentication and + integrity protection, methods supporting protected result indications + MUST also support the "key derivation", "mutual authentication", + "integrity protection", and "replay protection" claims. + + Protected result indications address some denial-of-service + vulnerabilities due to spoofing of Success and Failure packets, + though not all. EAP methods can typically provide protected result + indications only in some circumstances. For example, errors can + occur prior to key derivation, and so it may not be possible to + protect all failure indications. It is also possible that result + indications may not be supported in both directions or that + synchronization may not be achieved in all modes of operation. + + For example, within EAP-TLS [RFC2716], in the client authentication + handshake, the server authenticates the peer, but does not receive a + protected indication of whether the peer has authenticated it. In + contrast, the peer authenticates the server and is aware of whether + the server has authenticated it. In the session resumption + handshake, the peer authenticates the server, but does not receive a + protected indication of whether the server has authenticated it. In + this mode, the server authenticates the peer and is aware of whether + the peer has authenticated it. + +8. Acknowledgements + + This protocol derives much of its inspiration from Dave Carrel's AHA + document, as well as the PPP CHAP protocol [RFC1994]. Valuable + feedback was provided by Yoshihiro Ohba of Toshiba America Research, + Jari Arkko of Ericsson, Sachin Seth of Microsoft, Glen Zorn of Cisco + Systems, Jesse Walker of Intel, Bill Arbaugh, Nick Petroni and Bryan + Payne of the University of Maryland, Steve Bellovin of AT&T Research, + Paul Funk of Funk Software, Pasi Eronen of Nokia, Joseph Salowey of + Cisco, Paul Congdon of HP, and members of the EAP working group. + + The use of Security Claims sections for EAP methods, as required by + Section 7.2 and specified for each EAP method described in this + document, was inspired by Glen Zorn through [EAP-EVAL]. + + + + + + + +Aboba, et al. Standards Track [Page 58] + +RFC 3748 EAP June 2004 + + +9. References + +9.1. Normative References + + [RFC1661] Simpson, W., "The Point-to-Point Protocol (PPP)", + STD 51, RFC 1661, July 1994. + + [RFC1994] Simpson, W., "PPP Challenge Handshake + Authentication Protocol (CHAP)", RFC 1994, August + 1996. + + [RFC2119] Bradner, S., "Key words for use in RFCs to + Indicate Requirement Levels", BCP 14, RFC 2119, + March 1997. + + [RFC2243] Metz, C., "OTP Extended Responses", RFC 2243, + November 1997. + + [RFC2279] Yergeau, F., "UTF-8, a transformation format of + ISO 10646", RFC 2279, January 1998. + + [RFC2289] Haller, N., Metz, C., Nesser, P. and M. Straw, "A + One-Time Password System", RFC 2289, February + 1998. + + [RFC2434] Narten, T. and H. Alvestrand, "Guidelines for + Writing an IANA Considerations Section in RFCs", + BCP 26, RFC 2434, October 1998. + + [RFC2988] Paxson, V. and M. Allman, "Computing TCP's + Retransmission Timer", RFC 2988, November 2000. + + [IEEE-802] Institute of Electrical and Electronics Engineers, + "Local and Metropolitan Area Networks: Overview + and Architecture", IEEE Standard 802, 1990. + + [IEEE-802.1X] Institute of Electrical and Electronics Engineers, + "Local and Metropolitan Area Networks: Port-Based + Network Access Control", IEEE Standard 802.1X, + September 2001. + + + + + + + + + + + +Aboba, et al. Standards Track [Page 59] + +RFC 3748 EAP June 2004 + + +9.2. Informative References + + [RFC793] Postel, J., "Transmission Control Protocol", STD + 7, RFC 793, September 1981. + + [RFC1510] Kohl, J. and B. Neuman, "The Kerberos Network + Authentication Service (V5)", RFC 1510, September + 1993. + + [RFC1750] Eastlake, D., Crocker, S. and J. Schiller, + "Randomness Recommendations for Security", RFC + 1750, December 1994. + + [RFC2246] Dierks, T., Allen, C., Treese, W., Karlton, P., + Freier, A. and P. Kocher, "The TLS Protocol + Version 1.0", RFC 2246, January 1999. + + [RFC2284] Blunk, L. and J. Vollbrecht, "PPP Extensible + Authentication Protocol (EAP)", RFC 2284, March + 1998. + + [RFC2486] Aboba, B. and M. Beadles, "The Network Access + Identifier", RFC 2486, January 1999. + + [RFC2408] Maughan, D., Schneider, M. and M. Schertler, + "Internet Security Association and Key Management + Protocol (ISAKMP)", RFC 2408, November 1998. + + [RFC2409] Harkins, D. and D. Carrel, "The Internet Key + Exchange (IKE)", RFC 2409, November 1998. + + [RFC2433] Zorn, G. and S. Cobb, "Microsoft PPP CHAP + Extensions", RFC 2433, October 1998. + + [RFC2607] Aboba, B. and J. Vollbrecht, "Proxy Chaining and + Policy Implementation in Roaming", RFC 2607, June + 1999. + + [RFC2661] Townsley, W., Valencia, A., Rubens, A., Pall, G., + Zorn, G. and B. Palter, "Layer Two Tunneling + Protocol "L2TP"", RFC 2661, August 1999. + + [RFC2716] Aboba, B. and D. Simon, "PPP EAP TLS + Authentication Protocol", RFC 2716, October 1999. + + [RFC2865] Rigney, C., Willens, S., Rubens, A. and W. + Simpson, "Remote Authentication Dial In User + Service (RADIUS)", RFC 2865, June 2000. + + + +Aboba, et al. Standards Track [Page 60] + +RFC 3748 EAP June 2004 + + + [RFC2960] Stewart, R., Xie, Q., Morneault, K., Sharp, C., + Schwarzbauer, H., Taylor, T., Rytina, I., Kalla, + M., Zhang, L. and V. Paxson, "Stream Control + Transmission Protocol", RFC 2960, October 2000. + + [RFC3162] Aboba, B., Zorn, G. and D. Mitton, "RADIUS and + IPv6", RFC 3162, August 2001. + + [RFC3454] Hoffman, P. and M. Blanchet, "Preparation of + Internationalized Strings ("stringprep")", RFC + 3454, December 2002. + + [RFC3579] Aboba, B. and P. Calhoun, "RADIUS (Remote + Authentication Dial In User Service) Support For + Extensible Authentication Protocol (EAP)", RFC + 3579, September 2003. + + [RFC3580] Congdon, P., Aboba, B., Smith, A., Zorn, G. and J. + Roese, "IEEE 802.1X Remote Authentication Dial In + User Service (RADIUS) Usage Guidelines", RFC 3580, + September 2003. + + [RFC3692] Narten, T., "Assigning Experimental and Testing + Numbers Considered Useful", BCP 82, RFC 3692, + January 2004. + + [DECEPTION] Slatalla, M. and J. Quittner, "Masters of + Deception", Harper-Collins, New York, 1995. + + [KRBATTACK] Wu, T., "A Real-World Analysis of Kerberos + Password Security", Proceedings of the 1999 ISOC + Network and Distributed System Security Symposium, + http://www.isoc.org/isoc/conferences/ndss/99/ + proceedings/papers/wu.pdf. + + [KRBLIM] Bellovin, S. and M. Merrit, "Limitations of the + Kerberos authentication system", Proceedings of + the 1991 Winter USENIX Conference, pp. 253-267, + 1991. + + [KERB4WEAK] Dole, B., Lodin, S. and E. Spafford, "Misplaced + trust: Kerberos 4 session keys", Proceedings of + the Internet Society Network and Distributed + System Security Symposium, pp. 60-70, March 1997. + + + + + + + +Aboba, et al. Standards Track [Page 61] + +RFC 3748 EAP June 2004 + + + [PIC] Aboba, B., Krawczyk, H. and Y. Sheffer, "PIC, A + Pre-IKE Credential Provisioning Protocol", Work in + Progress, October 2002. + + [IKEv2] Kaufman, C., "Internet Key Exchange (IKEv2) + Protocol", Work in Progress, January 2004. + + [PPTPv1] Schneier, B. and Mudge, "Cryptanalysis of + Microsoft's Point-to- Point Tunneling Protocol", + Proceedings of the 5th ACM Conference on + Communications and Computer Security, ACM Press, + November 1998. + + [IEEE-802.11] Institute of Electrical and Electronics Engineers, + "Wireless LAN Medium Access Control (MAC) and + Physical Layer (PHY) Specifications", IEEE + Standard 802.11, 1999. + + [SILVERMAN] Silverman, Robert D., "A Cost-Based Security + Analysis of Symmetric and Asymmetric Key Lengths", + RSA Laboratories Bulletin 13, April 2000 (Revised + November 2001), + http://www.rsasecurity.com/rsalabs/bulletins/ + bulletin13.html. + + [KEYFRAME] Aboba, B., "EAP Key Management Framework", Work in + Progress, October 2003. + + [SASLPREP] Zeilenga, K., "SASLprep: Stringprep profile for + user names and passwords", Work in Progress, March + 2004. + + [IEEE-802.11i] Institute of Electrical and Electronics Engineers, + "Unapproved Draft Supplement to Standard for + Telecommunications and Information Exchange + Between Systems - LAN/MAN Specific Requirements - + Part 11: Wireless LAN Medium Access Control (MAC) + and Physical Layer (PHY) Specifications: + Specification for Enhanced Security", IEEE Draft + 802.11i (work in progress), 2003. + + [DIAM-EAP] Eronen, P., Hiller, T. and G. Zorn, "Diameter + Extensible Authentication Protocol (EAP) + Application", Work in Progress, February 2004. + + [EAP-EVAL] Zorn, G., "Specifying Security Claims for EAP + Authentication Types", Work in Progress, October + 2002. + + + +Aboba, et al. Standards Track [Page 62] + +RFC 3748 EAP June 2004 + + + [BINDING] Puthenkulam, J., "The Compound Authentication + Binding Problem", Work in Progress, October 2003. + + [MITM] Asokan, N., Niemi, V. and K. Nyberg, "Man-in-the- + Middle in Tunneled Authentication Protocols", IACR + ePrint Archive Report 2002/163, October 2002, + <http://eprint.iacr.org/2002/163>. + + [IEEE-802.11i-req] Stanley, D., "EAP Method Requirements for Wireless + LANs", Work in Progress, February 2004. + + [PPTPv2] Schneier, B. and Mudge, "Cryptanalysis of + Microsoft's PPTP Authentication Extensions (MS- + CHAPv2)", CQRE 99, Springer-Verlag, 1999, pp. + 192-203. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Aboba, et al. Standards Track [Page 63] + +RFC 3748 EAP June 2004 + + +Appendix A. Changes from RFC 2284 + + This section lists the major changes between [RFC2284] and this + document. Minor changes, including style, grammar, spelling, and + editorial changes are not mentioned here. + + o The Terminology section (Section 1.2) has been expanded, defining + more concepts and giving more exact definitions. + + o The concepts of Mutual Authentication, Key Derivation, and Result + Indications are introduced and discussed throughout the document + where appropriate. + + o In Section 2, it is explicitly specified that more than one + exchange of Request and Response packets may occur as part of the + EAP authentication exchange. How this may be used and how it may + not be used is specified in detail in Section 2.1. + + o Also in Section 2, some requirements have been made explicit for + the authenticator when acting in pass-through mode. + + o An EAP multiplexing model (Section 2.2) has been added to + illustrate a typical implementation of EAP. There is no + requirement that an implementation conform to this model, as long + as the on-the-wire behavior is consistent with it. + + o As EAP is now in use with a variety of lower layers, not just PPP + for which it was first designed, Section 3 on lower layer behavior + has been added. + + o In the description of the EAP Request and Response interaction + (Section 4.1), both the behavior on receiving duplicate requests, + and when packets should be silently discarded has been more + exactly specified. The implementation notes in this section have + been substantially expanded. + + o In Section 4.2, it has been clarified that Success and Failure + packets must not contain additional data, and the implementation + note has been expanded. A subsection giving requirements on + processing of success and failure packets has been added. + + o Section 5 on EAP Request/Response Types lists two new Type values: + the Expanded Type (Section 5.7), which is used to expand the Type + value number space, and the Experimental Type. In the Expanded + Type number space, the new Expanded Nak (Section 5.3.2) Type has + been added. Clarifications have been made in the description of + most of the existing Types. Security claims summaries have been + added for authentication methods. + + + +Aboba, et al. Standards Track [Page 64] + +RFC 3748 EAP June 2004 + + + o In Sections 5, 5.1, and 5.2, a requirement has been added such + that fields with displayable messages should contain UTF-8 encoded + ISO 10646 characters. + + o It is now required in Section 5.1 that if the Type-Data field of + an Identity Request contains a NUL-character, only the part before + the null is displayed. RFC 2284 prohibits the null termination of + the Type-Data field of Identity messages. This rule has been + relaxed for Identity Request messages and the Identity Request + Type-Data field may now be null terminated. + + o In Section 5.5, support for OTP Extended Responses [RFC2243] has + been added to EAP OTP. + + o An IANA Considerations section (Section 6) has been added, giving + registration policies for the numbering spaces defined for EAP. + + o The Security Considerations (Section 7) have been greatly + expanded, giving a much more comprehensive coverage of possible + threats and other security considerations. + + o In Section 7.5, text has been added on method-specific behavior, + providing guidance on how EAP method-specific integrity checks + should be processed. Where possible, it is desirable for a + method-specific MIC to be computed over the entire EAP packet, + including the EAP layer header (Code, Identifier, Length) and EAP + method layer header (Type, Type-Data). + + o In Section 7.14 the security risks involved in use of cleartext + passwords with EAP are described. + + o In Section 7.15 text has been added relating to detection of rogue + NAS behavior. + + + + + + + + + + + + + + + + + + +Aboba, et al. Standards Track [Page 65] + +RFC 3748 EAP June 2004 + + +Authors' Addresses + + Bernard Aboba + Microsoft Corporation + One Microsoft Way + Redmond, WA 98052 + USA + + Phone: +1 425 706 6605 + Fax: +1 425 936 6605 + EMail: bernarda@microsoft.com + + Larry J. Blunk + Merit Network, Inc + 4251 Plymouth Rd., Suite 2000 + Ann Arbor, MI 48105-2785 + USA + + Phone: +1 734-647-9563 + Fax: +1 734-647-3185 + EMail: ljb@merit.edu + + John R. Vollbrecht + Vollbrecht Consulting LLC + 9682 Alice Hill Drive + Dexter, MI 48130 + USA + + EMail: jrv@umich.edu + + James Carlson + Sun Microsystems, Inc + 1 Network Drive + Burlington, MA 01803-2757 + USA + + Phone: +1 781 442 2084 + Fax: +1 781 442 1677 + EMail: james.d.carlson@sun.com + + Henrik Levkowetz + ipUnplugged AB + Arenavagen 33 + Stockholm S-121 28 + SWEDEN + + Phone: +46 708 32 16 08 + EMail: henrik@levkowetz.com + + + +Aboba, et al. Standards Track [Page 66] + +RFC 3748 EAP June 2004 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2004). This document is subject + to the rights, licenses and restrictions contained in BCP 78, and + except as set forth therein, the authors retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at ietf- + ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + +Aboba, et al. Standards Track [Page 67] + diff --git a/doc/standards/rfc4186.txt b/doc/standards/rfc4186.txt new file mode 100644 index 000000000..e7435a01c --- /dev/null +++ b/doc/standards/rfc4186.txt @@ -0,0 +1,5155 @@ + + + + + + +Network Working Group H. Haverinen, Ed. +Request for Comments: 4186 Nokia +Category: Informational J. Salowey, Ed. + Cisco Systems + January 2006 + + + Extensible Authentication Protocol Method for + Global System for Mobile Communications (GSM) + Subscriber Identity Modules (EAP-SIM) + +Status of This Memo + + This memo provides information for the Internet community. It does + not specify an Internet standard of any kind. Distribution of this + memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2006). + +IESG Note + + The EAP-SIM protocol was developed by 3GPP. The documentation of + EAP-SIM is provided as information to the Internet community. While + the EAP WG has verified that EAP-SIM is compatible with EAP, as + defined in RFC 3748, no other review has been done, including + validation of the security claims. The IETF has also not reviewed + the security of the cryptographic algorithms. + +Abstract + + This document specifies an Extensible Authentication Protocol (EAP) + mechanism for authentication and session key distribution using the + Global System for Mobile Communications (GSM) Subscriber Identity + Module (SIM). GSM is a second generation mobile network standard. + The EAP-SIM mechanism specifies enhancements to GSM authentication + and key agreement whereby multiple authentication triplets can be + combined to create authentication responses and session keys of + greater strength than the individual GSM triplets. The mechanism + also includes network authentication, user anonymity support, result + indications, and a fast re-authentication procedure. + + + + + + + + + +Haverinen & Salowey Informational [Page 1] + +RFC 4186 EAP-SIM Authentication January 2006 + + +Table of Contents + + 1. Introduction ....................................................4 + 2. Terms ...........................................................5 + 3. Overview ........................................................8 + 4. Operation ......................................................10 + 4.1. Version Negotiation .......................................10 + 4.2. Identity Management .......................................11 + 4.2.1. Format, Generation and Usage of Peer Identities ....11 + 4.2.2. Communicating the Peer Identity to the Server ......17 + 4.2.3. Choice of Identity for the EAP-Response/Identity ...19 + 4.2.4. Server Operation in the Beginning of + EAP-SIM Exchange ...................................19 + 4.2.5. Processing of EAP-Request/SIM/Start by the Peer ....20 + 4.2.6. Attacks Against Identity Privacy ...................21 + 4.2.7. Processing of AT_IDENTITY by the Server ............22 + 4.3. Message Sequence Examples (Informative) ...................23 + 4.3.1. Full Authentication ................................24 + 4.3.2. Fast Re-authentication .............................25 + 4.3.3. Fall Back to Full Authentication ...................26 + 4.3.4. Requesting the Permanent Identity 1 ................27 + 4.3.5. Requesting the Permanent Identity 2 ................28 + 4.3.6. Three EAP-SIM/Start Roundtrips .....................28 + 5. Fast Re-Authentication .........................................30 + 5.1. General ...................................................30 + 5.2. Comparison to UMTS AKA ....................................31 + 5.3. Fast Re-authentication Identity ...........................31 + 5.4. Fast Re-authentication Procedure ..........................33 + 5.5. Fast Re-authentication Procedure when Counter Is + Too Small .................................................36 + 6. EAP-SIM Notifications ..........................................37 + 6.1. General ...................................................37 + 6.2. Result Indications ........................................39 + 6.3. Error Cases ...............................................40 + 6.3.1. Peer Operation .....................................40 + 6.3.2. Server Operation ...................................41 + 6.3.3. EAP-Failure ........................................42 + 6.3.4. EAP-Success ........................................42 + 7. Key Generation .................................................43 + 8. Message Format and Protocol Extensibility ......................45 + 8.1. Message Format ............................................45 + 8.2. Protocol Extensibility ....................................47 + 9. Messages .......................................................48 + 9.1. EAP-Request/SIM/Start .....................................48 + 9.2. EAP-Response/SIM/Start ....................................49 + 9.3. EAP-Request/SIM/Challenge .................................49 + 9.4. EAP-Response/SIM/Challenge ................................50 + 9.5. EAP-Request/SIM/Re-authentication .........................51 + + + +Haverinen & Salowey Informational [Page 2] + +RFC 4186 EAP-SIM Authentication January 2006 + + + 9.6. EAP-Response/SIM/Re-authentication ........................51 + 9.7. EAP-Response/SIM/Client-Error .............................52 + 9.8. EAP-Request/SIM/Notification ..............................52 + 9.9. EAP-Response/SIM/Notification .............................53 + 10. Attributes ....................................................53 + 10.1. Table of Attributes ......................................53 + 10.2. AT_VERSION_LIST ..........................................54 + 10.3. AT_SELECTED_VERSION ......................................55 + 10.4. AT_NONCE_MT ..............................................55 + 10.5. AT_PERMANENT_ID_REQ ......................................56 + 10.6. AT_ANY_ID_REQ ............................................56 + 10.7. AT_FULLAUTH_ID_REQ .......................................57 + 10.8. AT_IDENTITY ..............................................57 + 10.9. AT_RAND ..................................................58 + 10.10. AT_NEXT_PSEUDONYM .......................................59 + 10.11. AT_NEXT_REAUTH_ID .......................................59 + 10.12. AT_IV, AT_ENCR_DATA, and AT_PADDING .....................60 + 10.13. AT_RESULT_IND ...........................................62 + 10.14. AT_MAC ..................................................62 + 10.15. AT_COUNTER ..............................................63 + 10.16. AT_COUNTER_TOO_SMALL ....................................63 + 10.17. AT_NONCE_S ..............................................64 + 10.18. AT_NOTIFICATION .........................................64 + 10.19. AT_CLIENT_ERROR_CODE ....................................65 + 11. IANA Considerations ...........................................66 + 12. Security Considerations .......................................66 + 12.1. A3 and A8 Algorithms .....................................66 + 12.2. Identity Protection ......................................66 + 12.3. Mutual Authentication and Triplet Exposure ...............67 + 12.4. Flooding the Authentication Centre .......................69 + 12.5. Key Derivation ...........................................69 + 12.6. Cryptographic Separation of Keys and Session + Independence .............................................70 + 12.7. Dictionary Attacks .......................................71 + 12.8. Credentials Re-use .......................................71 + 12.9. Integrity and Replay Protection, and Confidentiality .....72 + 12.10. Negotiation Attacks .....................................73 + 12.11. Protected Result Indications ............................73 + 12.12. Man-in-the-Middle Attacks ...............................74 + 12.13. Generating Random Numbers ...............................74 + 13. Security Claims ...............................................74 + 14. Acknowledgements and Contributions ............................75 + 14.1. Contributors .............................................75 + 14.2. Acknowledgements .........................................75 + 14.2.1. Contributors' Addresses ...........................77 + 15. References ....................................................78 + 15.1. Normative References .....................................78 + 15.2. Informative References ...................................79 + + + +Haverinen & Salowey Informational [Page 3] + +RFC 4186 EAP-SIM Authentication January 2006 + + + Appendix A. Test Vectors .........................................81 + A.1. EAP-Request/Identity .....................................81 + A.2. EAP-Response/Identity ....................................81 + A.3. EAP-Request/SIM/Start ....................................82 + A.4. EAP-Response/SIM/Start ...................................82 + A.5. EAP-Request/SIM/Challenge ................................83 + A.6. EAP-Response/SIM/Challenge ...............................86 + A.7. EAP-Success ..............................................86 + A.8. Fast Re-authentication ...................................86 + A.9. EAP-Request/SIM/Re-authentication ........................87 + A.10. EAP-Response/SIM/Re-authentication ......................89 + Appendix B. Pseudo-Random Number Generator .......................90 + +1. Introduction + + This document specifies an Extensible Authentication Protocol (EAP) + [RFC3748] mechanism for authentication and session key distribution + using the Global System for Mobile Communications (GSM) Subscriber + Identity Module (SIM). + + GSM is a second generation mobile network standard. Second + generation mobile networks and third generation mobile networks use + different authentication and key agreement mechanisms. EAP-AKA + [EAP-AKA] specifies an EAP method that is based on the Authentication + and Key Agreement (AKA) mechanism used in 3rd generation mobile + networks. + + GSM authentication is based on a challenge-response mechanism. The + A3/A8 authentication and key derivation algorithms that run on the + SIM can be given a 128-bit random number (RAND) as a challenge. The + SIM runs operator-specific algorithms, which take the RAND and a + secret key Ki (stored on the SIM) as input, and produce a 32-bit + response (SRES) and a 64-bit long key Kc as output. The Kc key is + originally intended to be used as an encryption key over the air + interface, but in this protocol, it is used for deriving keying + material and is not directly used. Hence, the secrecy of Kc is + critical to the security of this protocol. For more information + about GSM authentication, see [GSM-03.20]. See Section 12.1 for more + discussion about the GSM algorithms used in EAP-SIM. + + The lack of mutual authentication is a weakness in GSM + authentication. The derived 64-bit cipher key (Kc) is not strong + enough for data networks in which stronger and longer keys are + required. Hence, in EAP-SIM, several RAND challenges are used for + generating several 64-bit Kc keys, which are combined to constitute + stronger keying material. In EAP-SIM, the client issues a random + number NONCE_MT to the network in order to contribute to key + derivation, and to prevent replays of EAP-SIM requests from previous + + + +Haverinen & Salowey Informational [Page 4] + +RFC 4186 EAP-SIM Authentication January 2006 + + + exchanges. The NONCE_MT can be conceived as the client's challenge + to the network. EAP-SIM also extends the combined RAND challenges + and other messages with a message authentication code in order to + provide message integrity protection along with mutual + authentication. + + EAP-SIM specifies optional support for protecting the privacy of + subscriber identity using the same concept as the GSM, which uses + pseudonyms/temporary identifiers. It also specifies an optional fast + re-authentication procedure. + + The security of EAP-SIM builds on underlying GSM mechanisms. The + security properties of EAP-SIM are documented in Section 11 of this + document. Implementers and users of EAP-SIM are advised to carefully + study the security considerations in Section 11 in order to determine + whether the security properties are sufficient for the environment in + question, especially as the secrecy of Kc keys is essential to the + security of EAP-SIM. In brief, EAP-SIM is in no sense weaker than + the GSM mechanisms. In some cases EAP-SIM provides better security + properties than the underlying GSM mechanisms, particularly if the + SIM credentials are only used for EAP-SIM and are not re-used from + GSM/GPRS. Many of the security features of EAP-SIM rely upon the + secrecy of the Kc values in the SIM triplets, so protecting these + values is key to the security of the EAP-SIM protocol. + + The 3rd Generation Partnership Project (3GPP) has specified an + enhanced Authentication and Key Agreement (AKA) architecture for the + Universal Mobile Telecommunications System (UMTS). The 3rd + generation AKA mechanism includes mutual authentication, replay + protection, and derivation of longer session keys. EAP-AKA [EAP-AKA] + specifies an EAP method that is based on the 3rd generation AKA. + EAP-AKA, which is a more secure protocol, may be used instead of + EAP-SIM, if 3rd generation identity modules and 3G network + infrastructures are available. + +2. Terms + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in [RFC2119]. + + The terms and abbreviations "authenticator", "backend authentication + server", "EAP server", "peer", "Silently Discard", "Master Session + Key (MSK)", and "Extended Master Session Key (EMSK)" in this document + are to be interpreted as described in [RFC3748]. + + + + + + +Haverinen & Salowey Informational [Page 5] + +RFC 4186 EAP-SIM Authentication January 2006 + + + This document frequently uses the following terms and abbreviations: + + AAA protocol + + Authentication, Authorization, and Accounting protocol + + AuC + + Authentication Centre. The GSM network element that provides + the authentication triplets for authenticating + the subscriber. + + Authentication vector + + GSM triplets can be alternatively called authentication + vectors. + + EAP + + Extensible Authentication Protocol + + Fast re-authentication + + An EAP-SIM authentication exchange that is based on keys + derived upon a preceding full authentication exchange. + The GSM authentication and key exchange algorithms are not + used in the fast re-authentication procedure. + + Fast Re-authentication Identity + + A fast re-authentication identity of the peer, including an NAI + realm portion in environments where a realm is used. Used on + fast re-authentication only. + + Fast Re-authentication Username + + The username portion of fast re-authentication identity, + i.e., not including any realm portions. + + Full authentication + + An EAP-SIM authentication exchange based on the GSM + authentication and key agreement algorithms. + + GSM + + Global System for Mobile communications. + + + + +Haverinen & Salowey Informational [Page 6] + +RFC 4186 EAP-SIM Authentication January 2006 + + + GSM Triplet + + The tuple formed by the three GSM authentication values RAND, + Kc, and SRES. + + IMSI + + International Mobile Subscriber Identifier, used in GSM to + identify subscribers. + + MAC + + Message Authentication Code + + NAI + + Network Access Identifier + + Nonce + + A value that is used at most once or that is never repeated + within the same cryptographic context. In general, a nonce can + be predictable (e.g., a counter) or unpredictable (e.g., a + random value). Since some cryptographic properties may depend + on the randomness of the nonce, attention should be paid to + whether a nonce is required to be random or not. In this + document, the term nonce is only used to denote random nonces, + and it is not used to denote counters. + + Permanent Identity + + The permanent identity of the peer, including an NAI realm + portion in environments where a realm is used. The permanent + identity is usually based on the IMSI. Used on full + authentication only. + + Permanent Username + + The username portion of permanent identity, i.e., not including + any realm portions. + + Pseudonym Identity + + A pseudonym identity of the peer, including an NAI realm + portion in environments where a realm is used. Used on + full authentication only. + + + + + +Haverinen & Salowey Informational [Page 7] + +RFC 4186 EAP-SIM Authentication January 2006 + + + Pseudonym Username + + The username portion of pseudonym identity, i.e., not including + any realm portions. + + SIM + + Subscriber Identity Module. The SIM is traditionally a smart + card distributed by a GSM operator. + +3. Overview + + Figure 1 shows an overview of the EAP-SIM full authentication + procedure, wherein optional protected success indications are not + used. The authenticator typically communicates with an EAP server + that is located on a backend authentication server using an AAA + protocol. The authenticator shown in the figure is often simply + relaying EAP messages to and from the EAP server, but these backend + AAA communications are not shown. + + Peer Authenticator + | EAP-Request/Identity | + |<---------------------------------------------------------| + | | + | EAP-Response/Identity | + |--------------------------------------------------------->| + | | + | EAP-Request/SIM/Start (AT_VERSION_LIST) | + |<---------------------------------------------------------| + | | + | EAP-Response/SIM/Start (AT_NONCE_MT, AT_SELECTED_VERSION)| + |--------------------------------------------------------->| + | | + | EAP-Request/SIM/Challenge (AT_RAND, AT_MAC) | + |<---------------------------------------------------------| + +-------------------------------------+ | + | Peer runs GSM algorithms, verifies | | + | AT_MAC and derives session keys | | + +-------------------------------------+ | + | EAP-Response/SIM/Challenge (AT_MAC) | + |--------------------------------------------------------->| + | | + | EAP-Success | + |<---------------------------------------------------------| + | | + + Figure 1: EAP-SIM full authentication procedure + + + + +Haverinen & Salowey Informational [Page 8] + +RFC 4186 EAP-SIM Authentication January 2006 + + + The first EAP Request issued by the authenticator is + EAP-Request/Identity. On full authentication, the peer's response + includes either the user's International Mobile Subscriber Identity + (IMSI) or a temporary identity (pseudonym) if identity privacy is in + effect, as specified in Section 4.2. + + Following the peer's EAP-Response/Identity packet, the peer receives + EAP Requests of Type 18 (SIM) from the EAP server and sends the + corresponding EAP Responses. The EAP packets that are of the Type + SIM also have a Subtype field. On full authentication, the first + EAP-Request/SIM packet is of the Subtype 10 (Start). EAP-SIM packets + encapsulate parameters in attributes, encoded in a Type, Length, + Value format. The packet format and the use of attributes are + specified in Section 8. + + The EAP-Request/SIM/Start packet contains the list of EAP-SIM + versions supported by the EAP server in the AT_VERSION_LIST + attribute. This packet may also include attributes for requesting + the subscriber identity, as specified in Section 4.2. + + The peer responds to a EAP-Request/SIM/Start with the + EAP-Response/SIM/Start packet, which includes the AT_NONCE_MT + attribute that contains a random number NONCE_MT, chosen by the peer, + and the AT_SELECTED_VERSION attribute that contains the version + number selected by the peer. The version negotiation is protected by + including the version list and the selected version in the + calculation of keying material (Section 7). + + After receiving the EAP Response/SIM/Start, the EAP server obtains n + GSM triplets for use in authenticating the subscriber, where n = 2 or + n = 3. From the triplets, the EAP server derives the keying + material, as specified in Section 7. The triplets may be obtained by + contacting an Authentication Centre (AuC) on the GSM network; per GSM + specifications, between 1 and 5 triplets may be obtained at a time. + Triplets may be stored in the EAP server for use at a later time, but + triplets MUST NOT be re-used, except in some error cases that are + specified in Section 10.9. + + The next EAP Request the EAP Server issues is of the type SIM and + subtype Challenge (11). It contains the RAND challenges and a + message authentication code attribute AT_MAC to cover the challenges. + The AT_MAC attribute is a general message authentication code + attribute that is used in many EAP-SIM messages. + + On receipt of the EAP-Request/SIM/Challenge message, the peer runs + the GSM authentication algorithm and calculates a copy of the message + authentication code. The peer then verifies that the calculated MAC + equals the received MAC. If the MAC's do not match, then the peer + + + +Haverinen & Salowey Informational [Page 9] + +RFC 4186 EAP-SIM Authentication January 2006 + + + sends the EAP-Response/SIM/Client-Error packet and the authentication + exchange terminates. + + Since the RANDs given to a peer are accompanied by the message + authentication code AT_MAC, and since the peer's NONCE_MT value + contributes to AT_MAC, the peer is able to verify that the EAP-SIM + message is fresh (i.e., not a replay) and that the sender possesses + valid GSM triplets for the subscriber. + + If all checks out, the peer responds with the + EAP-Response/SIM/Challenge, containing the AT_MAC attribute that + covers the peer's SRES response values (Section 9.4). The EAP server + verifies that the MAC is correct. Because protected success + indications are not used in this example, the EAP server sends the + EAP-Success packet, indicating that the authentication was + successful. (Protected success indications are discussed in + Section 6.2.) The EAP server may also include derived keying + material in the message it sends to the authenticator. The peer has + derived the same keying material, so the authenticator does not + forward the keying material to the peer along with EAP-Success. + + EAP-SIM also includes a separate fast re-authentication procedure + that does not make use of the A3/A8 algorithms or the GSM + infrastructure. Fast re-authentication is based on keys derived on + full authentication. If the peer has maintained state information + for fast re-authentication and wants to use fast re-authentication, + then the peer indicates this by using a specific fast + re-authentication identity instead of the permanent identity or a + pseudonym identity. The fast re-authentication procedure is + described in Section 5. + +4. Operation + +4.1. Version Negotiation + + EAP-SIM includes version negotiation so as to allow future + developments in the protocol. The version negotiation is performed + on full authentication and it uses two attributes, AT_VERSION_LIST, + which the server always includes in EAP-Request/SIM/Start, and + AT_SELECTED_VERSION, which the peer includes in + EAP-Response/SIM/Start on full authentication. + + AT_VERSION_LIST includes the EAP-SIM versions supported by the + server. If AT_VERSION_LIST does not include a version that is + implemented by the peer and allowed in the peer's security policy, + then the peer MUST send the EAP-Response/SIM/Client-Error packet + (Section 9.7) to the server with the error code "unsupported + version". If a suitable version is included, then the peer includes + + + +Haverinen & Salowey Informational [Page 10] + +RFC 4186 EAP-SIM Authentication January 2006 + + + the AT_SELECTED_VERSION attribute, containing the selected version in + the EAP-Response/SIM/Start packet. The peer MUST only indicate a + version that is included in the AT_VERSION_LIST. If several versions + are acceptable, then the peer SHOULD choose the version that occurs + first in the version list. + + The version number list of AT_VERSION_LIST and the selected version + of AT_SELECTED_VERSION are included in the key derivation procedure + (Section 7). If an attacker modifies either one of these attributes, + then the peer and the server derive different keying material. + Because K_aut keys are different, the server and peer calculate + different AT_MAC values. Hence, the peer detects that AT_MAC, + included in EAP-Request/SIM/Challenge, is incorrect and sends the + EAP-Response/SIM/Client-Error packet. The authentication procedure + terminates. + +4.2. Identity Management + +4.2.1. Format, Generation and Usage of Peer Identities + +4.2.1.1. General + + In the beginning of EAP authentication, the Authenticator or the EAP + server usually issues the EAP-Request/Identity packet to the peer. + The peer responds with the EAP-Response/Identity, which contains the + user's identity. The formats of these packets are specified in + [RFC3748]. + + GSM subscribers are identified with the International Mobile + Subscriber Identity (IMSI) [GSM-03.03]. The IMSI is a string of not + more than 15 digits. It is composed of a three digit Mobile Country + Code (MCC), a two or three digit Mobile Network Code (MNC), and a + Mobile Subscriber Identification Number (MSIN) of no more than 10 + digits. MCC and MNC uniquely identify the GSM operator and help + identify the AuC from which the authentication vectors need to be + retrieved for this subscriber. + + Internet AAA protocols identify users with the Network Access + Identifier (NAI) [RFC4282]. When used in a roaming environment, the + NAI is composed of a username and a realm, separated with "@" + (username@realm). The username portion identifies the subscriber + within the realm. + + This section specifies the peer identity format used in EAP-SIM. In + this document, the term "identity" or "peer identity" refers to the + whole identity string that is used to identify the peer. The peer + + + + + +Haverinen & Salowey Informational [Page 11] + +RFC 4186 EAP-SIM Authentication January 2006 + + + identity may include a realm portion. "Username" refers to the + portion of the peer identity that identifies the user, i.e., the + username does not include the realm portion. + +4.2.1.2. Identity Privacy Support + + EAP-SIM includes optional identity privacy (anonymity) support that + can be used to hide the cleartext permanent identity and thereby make + the subscriber's EAP exchanges untraceable to eavesdroppers. Because + the permanent identity never changes, revealing it would help + observers to track the user. The permanent identity is usually based + on the IMSI, which may further help the tracking, because the same + identifier may be used in other contexts as well. Identity privacy + is based on temporary identities, or pseudonyms, which are equivalent + to but separate from the Temporary Mobile Subscriber Identities + (TMSI) that are used on cellular networks. Please see Section 12.2 + for security considerations regarding identity privacy. + +4.2.1.3. Username Types in EAP-SIM identities + + There are three types of usernames in EAP-SIM peer identities: + + (1) Permanent usernames. For example, + 1123456789098765@myoperator.com might be a valid permanent identity. + In this example, 1123456789098765 is the permanent username. + + (2) Pseudonym usernames. For example, 3s7ah6n9q@myoperator.com might + be a valid pseudonym identity. In this example, 3s7ah6n9q is the + pseudonym username. + + (3) Fast re-authentication usernames. For example, + 53953754@myoperator.com might be a valid fast re-authentication + identity. In this case, 53953754 is the fast re-authentication + username. Unlike permanent usernames and pseudonym usernames, fast + re-authentication usernames are one-time identifiers, which are not + re-used across EAP exchanges. + + The first two types of identities are used only on full + authentication and the last one only on fast re-authentication. When + the optional identity privacy support is not used, the non-pseudonym + permanent identity is used on full authentication. The fast + re-authentication exchange is specified in Section 5. + +4.2.1.4. Username Decoration + + In some environments, the peer may need to decorate the identity by + prepending or appending the username with a string, in order to + indicate supplementary AAA routing information in addition to the NAI + + + +Haverinen & Salowey Informational [Page 12] + +RFC 4186 EAP-SIM Authentication January 2006 + + + realm. (The usage of an NAI realm portion is not considered + decoration.) Username decoration is out of the scope of this + document. However, it should be noted that username decoration might + prevent the server from recognizing a valid username. Hence, + although the peer MAY use username decoration in the identities that + the peer includes in EAP-Response/Identity, and although the EAP + server MAY accept a decorated peer username in this message, the peer + or the EAP server MUST NOT decorate any other peer identities that + are used in various EAP-SIM attributes. Only the identity used in + the EAP-Response/Identity may be decorated. + +4.2.1.5. NAI Realm Portion + + The peer MAY include a realm portion in the peer identity, as per the + NAI format. The use of a realm portion is not mandatory. + + If a realm is used, the realm MAY be chosen by the subscriber's home + operator and it MAY be a configurable parameter in the EAP-SIM peer + implementation. In this case, the peer is typically configured with + the NAI realm of the home operator. Operators MAY reserve a specific + realm name for EAP-SIM users. This convention makes it easy to + recognize that the NAI identifies a GSM subscriber. Such a reserved + NAI realm may be a useful hint as to the first authentication method + to use during method negotiation. When the peer is using a pseudonym + username instead of the permanent username, the peer selects the + realm name portion similarly as it select the realm portion when + using the permanent username. + + If no configured realm name is available, the peer MAY derive the + realm name from the MCC and MNC portions of the IMSI. A RECOMMENDED + way to derive the realm from the IMSI using the realm 3gppnetwork.org + is specified in [3GPP-TS-23.003]. + + Some old implementations derive the realm name from the IMSI by + concatenating "mnc", the MNC digits of IMSI, ".mcc", the MCC digits + of IMSI, and ".owlan.org". For example, if the IMSI is + 123456789098765, and the MNC is three digits long, then the derived + realm name is "mnc456.mcc123.owlan.org". As there are no DNS servers + running at owlan.org, these realm names can only be used with + manually configured AAA routing. New implementations SHOULD use the + mechanism specified in [3GPP-TS-23.003] instead of owlan.org. + + The IMSI is a string of digits without any explicit structure, so the + peer may not be able to determine the length of the MNC portion. If + the peer is not able to determine whether the MNC is two or three + digits long, the peer MAY use a 3-digit MNC. If the correct length + of the MNC is two, then the MNC used in the realm name includes the + first digit of the MSIN. Hence, when configuring AAA networks for + + + +Haverinen & Salowey Informational [Page 13] + +RFC 4186 EAP-SIM Authentication January 2006 + + + operators that have 2-digit MNCs, the network SHOULD also be prepared + for realm names with incorrect, 3-digit MNCs. + +4.2.1.6. Format of the Permanent Username + + The non-pseudonym permanent username SHOULD be derived from the IMSI. + In this case, the permanent username MUST be of the format "1" | + IMSI, where the character "|" denotes concatenation. In other words, + the first character of the username is the digit one (ASCII value 31 + hexadecimal), followed by the IMSI. The IMSI is encoded as an ASCII + string that consists of not more than 15 decimal digits (ASCII values + between 30 and 39 hexadecimal), one character per IMSI digit, in the + order specified in [GSM-03.03]. For example, a permanent username + derived from the IMSI 295023820005424 would be encoded as the ASCII + string "1295023820005424" (byte values in hexadecimal notation: 31 32 + 39 35 30 32 33 38 32 30 30 30 35 34 32 34). + + The EAP server MAY use the leading "1" as a hint to try EAP-SIM as + the first authentication method during method negotiation, rather + than, for example EAP/AKA. The EAP-SIM server MAY propose EAP-SIM, + even if the leading character was not "1". + + Alternatively, an implementation MAY choose a permanent username that + is not based on the IMSI. In this case, the selection of the + username, its format, and its processing is out of the scope of this + document. In this case, the peer implementation MUST NOT prepend any + leading characters to the username. + +4.2.1.7. Generating Pseudonyms and Fast Re-authentication Identities by + the Server + + Pseudonym usernames and fast re-authentication identities are + generated by the EAP server. The EAP server produces pseudonym + usernames and fast re-authentication identities in an + implementation-dependent manner. Only the EAP server needs to be + able to map the pseudonym username to the permanent identity, or to + recognize a fast re-authentication identity. + + EAP-SIM includes no provisions to ensure that the same EAP server + that generated a pseudonym username will be used on the + authentication exchange when the pseudonym username is used. It is + recommended that the EAP servers implement some centralized mechanism + to allow all EAP servers of the home operator to map pseudonyms + generated by other severs to the permanent identity. If no such + mechanism is available, then the EAP server failing to understand a + pseudonym issued by another server can request the that peer send the + permanent identity. + + + + +Haverinen & Salowey Informational [Page 14] + +RFC 4186 EAP-SIM Authentication January 2006 + + + When issuing a fast re-authentication identity, the EAP server may + include a realm name in the identity to make the fast + re-authentication request be forwarded to the same EAP server. + + When generating fast re-authentication identities, the server SHOULD + choose a fresh, new fast re-authentication identity that is different + from the previous ones that were used after the same full + authentication exchange. A full authentication exchange and the + associated fast re-authentication exchanges are referred to here as + the same "full authentication context". The fast re-authentication + identity SHOULD include a random component. This random component + works as a full authentication context identifier. A + context-specific fast re-authentication identity can help the server + to detect whether its fast re-authentication state information + matches that of its peer (in other words, whether the state + information is from the same full authentication exchange). The + random component also makes the fast re-authentication identities + unpredictable, so an attacker cannot initiate a fast + re-authentication exchange to get the server's EAP-Request/SIM/ + Re-authentication packet. + + Transmitting pseudonyms and fast re-authentication identities from + the server to the peer is discussed in Section 4.2.1.8. The + pseudonym is transmitted as a username, without an NAI realm, and the + fast re-authentication identity is transmitted as a complete NAI, + including a realm portion if a realm is required. The realm is + included in the fast re-authentication identity to allow the server + to include a server-specific realm. + + Regardless of the construction method, the pseudonym username MUST + conform to the grammar specified for the username portion of an NAI. + The fast re-authentication identity also MUST conform to the NAI + grammar. The EAP servers that the subscribers of an operator can use + MUST ensure that the pseudonym usernames and the username portions + used in fast re-authentication identities they generate are unique. + + In any case, it is necessary that permanent usernames, pseudonym + usernames, and fast re-authentication usernames are separate and + recognizable from each other. It is also desirable that EAP-SIM and + EAP-AKA [EAP-AKA] usernames be distinguishable from each other as an + aid for the server on which method to offer. + + In general, it is the task of the EAP server and the policies of its + administrator to ensure sufficient separation of the usernames. + Pseudonym usernames and fast re-authentication usernames are both + produced and used by the EAP server. The EAP server MUST compose + pseudonym usernames and fast re-authentication usernames so that it + can determine if an NAI username is an EAP-SIM pseudonym username or + + + +Haverinen & Salowey Informational [Page 15] + +RFC 4186 EAP-SIM Authentication January 2006 + + + an EAP-SIM fast re-authentication username. For instance, when the + usernames have been derived from the IMSI, the server could use + different leading characters in the pseudonym usernames and fast + re-authentication usernames (e.g., the pseudonym could begin with a + leading "3" character). When mapping a fast re-authentication + identity to a permanent identity, the server SHOULD only examine the + username portion of the fast re-authentication identity and ignore + the realm portion of the identity. + + Because the peer may fail to save a pseudonym username sent in an + EAP-Request/SIM/Challenge, for example due to malfunction, the EAP + server SHOULD maintain at least the most recently used pseudonym + username in addition to the most recently issued pseudonym username. + If the authentication exchange is not completed successfully, then + the server SHOULD NOT overwrite the pseudonym username that was + issued during the most recent successful authentication exchange. + +4.2.1.8. Transmitting Pseudonyms and Fast Re-authentication Identities + to the Peer + + The server transmits pseudonym usernames and fast re-authentication + identities to the peer in cipher, using the AT_ENCR_DATA attribute. + + The EAP-Request/SIM/Challenge message MAY include an encrypted + pseudonym username and/or an encrypted fast re-authentication + identity in the value field of the AT_ENCR_DATA attribute. Because + identity privacy support and fast re-authentication are optional + implementations, the peer MAY ignore the AT_ENCR_DATA attribute and + always use the permanent identity. On fast re-authentication + (discussed in Section 5), the server MAY include a new, encrypted + fast re-authentication identity in the + EAP-Request/SIM/Re-authentication message. + + On receipt of the EAP-Request/SIM/Challenge, the peer MAY decrypt the + encrypted data in AT_ENCR_DATA. If the authentication exchange is + successful, and the encrypted data includes a pseudonym username, + then the peer may use the obtained pseudonym username on the next + full authentication. If a fast re-authentication identity is + included, then the peer MAY save it together with other fast + re-authentication state information, as discussed in Section 5, for + the next fast re-authentication. If the authentication exchange does + not complete successfully, the peer MUST ignore the received + pseudonym username and the fast re-authentication identity. + + If the peer does not receive a new pseudonym username in the + EAP-Request/SIM/Challenge message, the peer MAY use an old pseudonym + username instead of the permanent username on the next full + authentication. The username portions of fast re-authentication + + + +Haverinen & Salowey Informational [Page 16] + +RFC 4186 EAP-SIM Authentication January 2006 + + + identities are one-time usernames, which the peer MUST NOT re-use. + When the peer uses a fast re-authentication identity in an EAP + exchange, the peer MUST discard the fast re-authentication identity + and not re-use it in another EAP authentication exchange, even if the + authentication exchange was not completed. + +4.2.1.9. Usage of the Pseudonym by the Peer + + When the optional identity privacy support is used on full + authentication, the peer MAY use a pseudonym username received as + part of a previous full authentication sequence as the username + portion of the NAI. The peer MUST NOT modify the pseudonym username + received in AT_NEXT_PSEUDONYM. However, as discussed above, the peer + MAY need to decorate the username in some environments by appending + or prepending the username with a string that indicates supplementary + AAA routing information. + + When using a pseudonym username in an environment where a realm + portion is used, the peer concatenates the received pseudonym + username with the "@" character and an NAI realm portion. The + selection of the NAI realm is discussed above. The peer can select + the realm portion similarly, regardless of whether it uses the + permanent username or a pseudonym username. + +4.2.1.10. Usage of the Fast Re-authentication Identity by the Peer + + On fast re-authentication, the peer uses the fast re-authentication + identity that was received as part of the previous authentication + sequence. A new re-authentication identity may be delivered as part + of both full authentication and fast re-authentication. The peer + MUST NOT modify the username part of the fast re-authentication + identity received in AT_NEXT_REAUTH_ID, except in cases when username + decoration is required. Even in these cases, the "root" fast + re-authentication username must not be modified, but it may be + appended or prepended with another string. + +4.2.2. Communicating the Peer Identity to the Server + +4.2.2.1. General + + The peer identity MAY be communicated to the server with the + EAP-Response/Identity message. This message MAY contain the + permanent identity, a pseudonym identity, or a fast re-authentication + identity. If the peer uses the permanent identity or a pseudonym + identity, which the server is able to map to the permanent identity, + then the authentication proceeds as discussed in the overview of + Section 3. If the peer uses a fast re-authentication identity, and + if the fast re-authentication identity matches with a valid fast + + + +Haverinen & Salowey Informational [Page 17] + +RFC 4186 EAP-SIM Authentication January 2006 + + + re-authentication identity maintained by the server, and if the + server agrees to use fast re-authentication, then a fast + re-authentication exchange is performed, as described in Section 5. + + The peer identity can also be transmitted from the peer to the server + using EAP-SIM messages instead of the EAP-Response/Identity. In this + case, the server includes an identity-requesting attribute + (AT_ANY_ID_REQ, AT_FULLAUTH_ID_REQ or AT_PERMANENT_ID_REQ) in the + EAP-Request/SIM/Start message, and the peer includes the AT_IDENTITY + attribute, which contains the peer's identity, in the + EAP-Response/SIM/Start message. The AT_ANY_ID_REQ attribute is a + general identity-requesting attribute, which the server uses if it + does not specify which kind of an identity the peer should return in + AT_IDENTITY. The server uses the AT_FULLAUTH_ID_REQ attribute to + request either the permanent identity or a pseudonym identity. The + server uses the AT_PERMANENT_ID_REQ attribute to request that the + peer send its permanent identity. + + The identity format in the AT_IDENTITY attribute is the same as in + the EAP-Response/Identity packet (except that identity decoration is + not allowed). The AT_IDENTITY attribute contains a permanent + identity, a pseudonym identity, or a fast re-authentication identity. + + Please note that the EAP-SIM peer and the EAP-SIM server only process + the AT_IDENTITY attribute; entities that only pass through EAP + packets do not process this attribute. Hence, the authenticator and + other intermediate AAA elements (such as possible AAA proxy servers) + will continue to refer to the peer with the original identity from + the EAP-Response/Identity packet unless the identity authenticated in + the AT_IDENTITY attribute is communicated to them in another way + within the AAA protocol. + +4.2.2.2. Relying on EAP-Response/Identity Discouraged + + The EAP-Response/Identity packet is not method-specific, so in many + implementations it may be handled by an EAP Framework. This + introduces an additional layer of processing between the EAP peer and + EAP server. The extra layer of processing may cache identity + responses or add decorations to the identity. A modification of the + identity response will cause the EAP peer and EAP server to use + different identities in the key derivation, which will cause the + protocol to fail. + + For this reason, it is RECOMMENDED that the EAP peer and server use + the method-specific identity attributes in EAP-SIM, and the server is + strongly discouraged from relying upon the EAP-Response/Identity. + + + + + +Haverinen & Salowey Informational [Page 18] + +RFC 4186 EAP-SIM Authentication January 2006 + + + In particular, if the EAP server receives a decorated identity in + EAP-Response/Identity, then the EAP server MUST use the + identity-requesting attributes to request that the peer send an + unmodified and undecorated copy of the identity in AT_IDENTITY. + +4.2.3. Choice of Identity for the EAP-Response/Identity + + If EAP-SIM peer is started upon receiving an EAP-Request/Identity + message, then the peer MAY use an EAP-SIM identity in the EAP- + Response/Identity packet. In this case, the peer performs the + following steps. + + If the peer has maintained fast re-authentication state information + and wants to use fast re-authentication, then the peer transmits the + fast re-authentication identity in EAP-Response/Identity. + + Else, if the peer has a pseudonym username available, then the peer + transmits the pseudonym identity in EAP-Response/Identity. + + In other cases, the peer transmits the permanent identity in + EAP-Response/Identity. + +4.2.4. Server Operation in the Beginning of EAP-SIM Exchange + + As discussed in Section 4.2.2.2, the server SHOULD NOT rely on an + identity string received in EAP-Response/Identity. Therefore, the + RECOMMENDED way to start an EAP-SIM exchange is to ignore any + received identity strings. The server SHOULD begin the EAP-SIM + exchange by issuing the EAP-Request/SIM/Start packet with an + identity-requesting attribute to indicate that the server wants the + peer to include an identity in the AT_IDENTITY attribute of the EAP- + Response/SIM/Start message. Three methods to request an identity + from the peer are discussed below. + + If the server chooses not to ignore the contents of EAP- + Response/Identity, then the server may have already received an EAP- + SIM identity in this packet. However, if the EAP server has not + received any EAP-SIM peer identity (permanent identity, pseudonym + identity, or fast re-authentication identity) from the peer when + sending the first EAP-SIM request, or if the EAP server has received + an EAP-Response/Identity packet but the contents do not appear to be + a valid permanent identity, pseudonym identity or a re-authentication + identity, then the server MUST request an identity from the peer + using one of the methods below. + + The server sends the EAP-Request/SIM/Start message with the + AT_PERMANENT_ID_REQ attribute to indicate that the server wants the + peer to include the permanent identity in the AT_IDENTITY attribute + + + +Haverinen & Salowey Informational [Page 19] + +RFC 4186 EAP-SIM Authentication January 2006 + + + of the EAP-Response/SIM/Start message. This is done in the following + cases: + + o The server does not support fast re-authentication or identity + privacy. + + o The server decided to process a received identity, and the server + recognizes the received identity as a pseudonym identity but the + server is not able to map the pseudonym identity to a permanent + identity. + + The server issues the EAP-Request/SIM/Start packet with the + AT_FULLAUTH_ID_REQ attribute to indicate that the server wants the + peer to include a full authentication identity (pseudonym identity or + permanent identity) in the AT_IDENTITY attribute of the + EAP-Response/SIM/Start message. This is done in the following cases: + + o The server does not support fast re-authentication and the server + supports identity privacy. + + o The server decided to process a received identity, and the server + recognizes the received identity as a re-authentication identity + but the server is not able to map the re-authentication identity + to a permanent identity. + + The server issues the EAP-Request/SIM/Start packet with the + AT_ANY_ID_REQ attribute to indicate that the server wants the peer to + include an identity in the AT_IDENTITY attribute of the + EAP-Response/SIM/Start message, and the server does not indicate any + preferred type for the identity. This is done in other cases, such + as when the server ignores a received EAP-Response/Identity, the + server does not have any identity, or the server does not recognize + the format of a received identity. + +4.2.5. Processing of EAP-Request/SIM/Start by the Peer + + Upon receipt of an EAP-Request/SIM/Start message, the peer MUST + perform the following steps. + + If the EAP-Request/SIM/Start does not include an identity request + attribute, then the peer responds with EAP-Response/SIM/Start without + AT_IDENTITY. The peer includes the AT_SELECTED_VERSION and + AT_NONCE_MT attributes, because the exchange is a full authentication + exchange. + + If the EAP-Request/SIM/Start includes AT_PERMANENT_ID_REQ, and if the + peer does not have a pseudonym available, then the peer MUST respond + with EAP-Response/SIM/Start and include the permanent identity in + + + +Haverinen & Salowey Informational [Page 20] + +RFC 4186 EAP-SIM Authentication January 2006 + + + AT_IDENTITY. If the peer has a pseudonym available, then the peer + MAY refuse to send the permanent identity; hence, in this case the + peer MUST either respond with EAP-Response/SIM/Start and include the + permanent identity in AT_IDENTITY or respond with EAP-Response/SIM/ + Client-Error packet with the code "unable to process packet". + + If the EAP-Request/SIM/Start includes AT_FULL_AUTH_ID_REQ, and if the + peer has a pseudonym available, then the peer SHOULD respond with + EAP-Response/SIM/Start and include the pseudonym identity in + AT_IDENTITY. If the peer does not have a pseudonym when it receives + this message, then the peer MUST respond with EAP-Response/SIM/Start + and include the permanent identity in AT_IDENTITY. The Peer MUST NOT + use a re-authentication identity in the AT_IDENTITY attribute. + + If the EAP-Request/SIM/Start includes AT_ANY_ID_REQ, and if the peer + has maintained fast re-authentication state information and the peer + wants to use fast re-authentication, then the peer responds with + EAP-Response/SIM/Start and includes the fast re-authentication + identity in AT_IDENTITY. Else, if the peer has a pseudonym identity + available, then the peer responds with EAP-Response/SIM/Start and + includes the pseudonym identity in AT_IDENTITY. Else, the peer + responds with EAP-Response/SIM/Start and includes the permanent + identity in AT_IDENTITY. + + An EAP-SIM exchange may include several EAP/SIM/Start rounds. The + server may issue a second EAP-Request/SIM/Start if it was not able to + recognize the identity that the peer used in the previous AT_IDENTITY + attribute. At most, three EAP/SIM/Start rounds can be used, so the + peer MUST NOT respond to more than three EAP-Request/SIM/Start + messages within an EAP exchange. The peer MUST verify that the + sequence of EAP-Request/SIM/Start packets that the peer receives + comply with the sequencing rules defined in this document. That is, + AT_ANY_ID_REQ can only be used in the first EAP-Request/SIM/Start; in + other words, AT_ANY_ID_REQ MUST NOT be used in the second or third + EAP-Request/SIM/Start. AT_FULLAUTH_ID_REQ MUST NOT be used if the + previous EAP-Request/SIM/Start included AT_PERMANENT_ID_REQ. The + peer operation, in cases when it receives an unexpected attribute or + an unexpected message, is specified in Section 6.3.1. + +4.2.6. Attacks Against Identity Privacy + + The section above specifies two possible ways the peer can operate + upon receipt of AT_PERMANENT_ID_REQ. This is because a received + AT_PERMANENT_ID_REQ does not necessarily originate from the valid + network, but an active attacker may transmit an EAP-Request/SIM/ + Start packet with an AT_PERMANENT_ID_REQ attribute to the peer, in an + effort to find out the true identity of the user. If the peer does + not want to reveal its permanent identity, then the peer sends the + + + +Haverinen & Salowey Informational [Page 21] + +RFC 4186 EAP-SIM Authentication January 2006 + + + EAP-Response/SIM/Client-Error packet with the error code "unable to + process packet", and the authentication exchange terminates. + + Basically, there are two different policies that the peer can employ + with regard to AT_PERMANENT_ID_REQ. A "conservative" peer assumes + that the network is able to maintain pseudonyms robustly. Therefore, + if a conservative peer has a pseudonym username, the peer responds + with EAP-Response/SIM/Client-Error to the EAP packet with + AT_PERMANENT_ID_REQ, because the peer believes that the valid network + is able to map the pseudonym identity to the peer's permanent + identity. (Alternatively, the conservative peer may accept + AT_PERMANENT_ID_REQ in certain circumstances, for example, if the + pseudonym was received a long time ago.) The benefit of this policy + is that it protects the peer against active attacks on anonymity. On + the other hand, a "liberal" peer always accepts the + AT_PERMANENT_ID_REQ and responds with the permanent identity. The + benefit of this policy is that it works even if the valid network + sometimes loses pseudonyms and is not able to map them to the + permanent identity. + +4.2.7. Processing of AT_IDENTITY by the Server + + When the server receives an EAP-Response/SIM/Start message with the + AT_IDENTITY (in response to the server's identity requesting + attribute), the server MUST operate as follows. + + If the server used AT_PERMANENT_ID_REQ, and if the AT_IDENTITY does + not contain a valid permanent identity, then the server sends + EAP-Request/SIM/Notification with AT_NOTIFICATION code "General + failure" (16384), and the EAP exchange terminates. If the server + recognizes the permanent identity and is able to continue, then the + server proceeds with full authentication by sending EAP-Request/SIM/ + Challenge. + + If the server used AT_FULLAUTH_ID_REQ, and if AT_IDENTITY contains a + valid permanent identity or a pseudonym identity that the server can + map to a valid permanent identity, then the server proceeds with full + authentication by sending EAP-Request/SIM/Challenge. If AT_IDENTITY + contains a pseudonym identity that the server is not able to map to a + valid permanent identity, or an identity that the server is not able + to recognize or classify, then the server sends EAP-Request/SIM/Start + with AT_PERMANENT_ID_REQ. + + If the server used AT_ANY_ID_REQ, and if the AT_IDENTITY contains a + valid permanent identity or a pseudonym identity that the server can + map to a valid permanent identity, then the server proceeds with full + authentication by sending EAP-Request/SIM/Challenge. + + + + +Haverinen & Salowey Informational [Page 22] + +RFC 4186 EAP-SIM Authentication January 2006 + + + If the server used AT_ANY_ID_REQ, and if AT_IDENTITY contains a valid + fast re-authentication identity and the server agrees on using + re-authentication, then the server proceeds with fast + re-authentication by sending EAP-Request/SIM/Re-authentication + (Section 5). + + If the server used AT_ANY_ID_REQ, and if the peer sent an + EAP-Response/SIM/Start with only AT_IDENTITY (indicating + re-authentication), but the server is not able to map the identity to + a permanent identity, then the server sends EAP-Request/SIM/Start + with AT_FULLAUTH_ID_REQ. + + If the server used AT_ANY_ID_REQ, and if AT_IDENTITY contains a valid + fast re-authentication identity that the server is able to map to a + permanent identity, and if the server does not want to use fast + re-authentication, then the server sends EAP-Request/SIM/Start + without any identity requesting attributes. + + If the server used AT_ANY_ID_REQ, and AT_IDENTITY contains an + identity that the server recognizes as a pseudonym identity but the + server is not able to map the pseudonym identity to a permanent + identity, then the server sends EAP-Request/SIM/Start with + AT_PERMANENT_ID_REQ. + + If the server used AT_ANY_ID_REQ, and AT_IDENTITY contains an + identity that the server is not able to recognize or classify, then + the server sends EAP-Request/SIM/Start with AT_FULLAUTH_ID_REQ. + +4.3. Message Sequence Examples (Informative) + + This section contains non-normative message sequence examples to + illustrate how the peer identity can be communicated to the server. + + + + + + + + + + + + + + + + + + + +Haverinen & Salowey Informational [Page 23] + +RFC 4186 EAP-SIM Authentication January 2006 + + +4.3.1. Full Authentication + + This case for full authentication is illustrated below in Figure 2. + In this case, AT_IDENTITY contains either the permanent identity or a + pseudonym identity. The same sequence is also used in case the + server uses the AT_FULLAUTH_ID_REQ in EAP-Request/SIM/Start. + + Peer Authenticator + | | + | +------------------------------+ + | | Server does not have a | + | | Subscriber identity available| + | | When starting EAP-SIM | + | +------------------------------+ + | | + | EAP-Request/SIM/Start | + | (AT_ANY_ID_REQ, AT_VERSION_LIST) | + |<------------------------------------------------------| + | | + | | + | EAP-Response/SIM/Start | + | (AT_IDENTITY, AT_NONCE_MT, | + | AT_SELECTED_VERSION) | + |------------------------------------------------------>| + | | + + Figure 2: Requesting any identity, full authentication + + If the peer uses its full authentication identity and the AT_IDENTITY + attribute contains a valid permanent identity or a valid pseudonym + identity that the EAP server is able to map to the permanent + identity, then the full authentication sequence proceeds as usual + with the EAP Server issuing the EAP-Request/SIM/Challenge message. + + + + + + + + + + + + + + + + + + +Haverinen & Salowey Informational [Page 24] + +RFC 4186 EAP-SIM Authentication January 2006 + + +4.3.2. Fast Re-authentication + + The case when the server uses the AT_ANY_ID_REQ and the peer wants to + perform fast re-authentication is illustrated below in Figure 3. + + Peer Authenticator + | | + | +------------------------------+ + | | Server does not have a | + | | Subscriber identity available| + | | When starting EAP-SIM | + | +------------------------------+ + | | + | EAP-Request/SIM/Start | + | (AT_ANY_ID_REQ, AT_VERSION_LIST) | + |<------------------------------------------------------| + | | + | | + | EAP-Response/SIM/Start | + | (AT_IDENTITY containing a fast re-auth. identity) | + |------------------------------------------------------>| + | | + + Figure 3: Requesting any identity, fast re-authentication + + On fast re-authentication, if the AT_IDENTITY attribute contains a + valid fast re-authentication identity and the server agrees on using + fast re-authentication, then the server proceeds with the fast + re-authentication sequence and issues the EAP-Request/SIM/ + Re-authentication packet, as specified in Section 5. + + + + + + + + + + + + + + + + + + + + + +Haverinen & Salowey Informational [Page 25] + +RFC 4186 EAP-SIM Authentication January 2006 + + +4.3.3. Fall Back to Full Authentication + + Figure 4 illustrates cases in which the server does not recognize the + fast re-authentication identity the peer used in AT_IDENTITY, and + issues a second EAP-Request/SIM/Start message. + + Peer Authenticator + | | + | +------------------------------+ + | | Server does not have a | + | | Subscriber identity available| + | | When starting EAP-SIM | + | +------------------------------+ + | | + | EAP-Request/SIM/Start | + | (AT_ANY_ID_REQ, AT_VERSION_LIST) | + |<------------------------------------------------------| + | | + | | + | EAP-Response/SIM/Start | + | (AT_IDENTITY containing a fast re-auth. identity) | + |------------------------------------------------------>| + | | + | +------------------------------+ + | | Server does not recognize | + | | The fast re-auth. | + | | Identity | + | +------------------------------+ + | | + | EAP-Request/SIM/Start | + | (AT_FULLAUTH_ID_REQ, AT_VERSION_LIST) | + |<------------------------------------------------------| + | | + | | + | EAP-Response/SIM/Start | + | (AT_IDENTITY with a full-auth. identity, AT_NONCE_MT, | + | AT_SELECTED_VERSION) | + |------------------------------------------------------>| + | | + + Figure 4: Fall back to full authentication + + + + + + + + + + +Haverinen & Salowey Informational [Page 26] + +RFC 4186 EAP-SIM Authentication January 2006 + + +4.3.4. Requesting the Permanent Identity 1 + + Figure 5 illustrates the case in which the EAP server fails to map + the pseudonym identity included in the EAP-Response/Identity packet + to a valid permanent identity. + + Peer Authenticator + | | + | EAP-Request/Identity | + |<------------------------------------------------------| + | | + | EAP-Response/Identity | + | (Includes a pseudonym) | + |------------------------------------------------------>| + | | + | +------------------------------+ + | | Server fails to map the | + | | Pseudonym to a permanent id. | + | +------------------------------+ + | EAP-Request/SIM/Start | + | (AT_PERMANENT_ID_REQ, AT_VERSION_LIST) | + |<------------------------------------------------------| + | | + | EAP-Response/SIM/Start | + | (AT_IDENTITY with permanent identity, AT_NONCE_MT, | + | AT_SELECTED_VERSION) | + |------------------------------------------------------>| + | | + + Figure 5: Requesting the permanent identity + + If the server recognizes the permanent identity, then the + authentication sequence proceeds as usual with the EAP Server issuing + the EAP-Request/SIM/Challenge message. + + + + + + + + + + + + + + + + + +Haverinen & Salowey Informational [Page 27] + +RFC 4186 EAP-SIM Authentication January 2006 + + +4.3.5. Requesting the Permanent Identity 2 + + Figure 6 illustrates the case in which the EAP server fails to map + the pseudonym included in the AT_IDENTITY attribute to a valid + permanent identity. + + Peer Authenticator + | | + | +------------------------------+ + | | Server does not have a | + | | Subscriber identity available| + | | When starting EAP-SIM | + | +------------------------------+ + | EAP-Request/SIM/Start | + | (AT_ANY_ID_REQ, AT_VERSION_LIST) | + |<------------------------------------------------------| + | | + |EAP-Response/SIM/Start | + |(AT_IDENTITY with a pseudonym identity, AT_NONCE_MT, | + | AT_SELECTED_VERSION) | + |------------------------------------------------------>| + | +-------------------------------+ + | | Server fails to map the | + | | Pseudonym in AT_IDENTITY | + | | to a valid permanent identity | + | +-------------------------------+ + | | + | EAP-Request/SIM/Start | + | (AT_PERMANENT_ID_REQ, AT_VERSION_LIST) | + |<------------------------------------------------------| + | | + | EAP-Response/SIM/Start | + | (AT_IDENTITY with permanent identity, | + | AT_NONCE_MT, AT_SELECTED_VERSION) | + |------------------------------------------------------>| + | | + + Figure 6: Requesting a permanent identity (two EAP-SIM Start rounds) + +4.3.6. Three EAP-SIM/Start Roundtrips + + In the worst case, there are three EAP/SIM/Start round trips before + the server obtains an acceptable identity. This case is illustrated + in Figure 7. + + + + + + + +Haverinen & Salowey Informational [Page 28] + +RFC 4186 EAP-SIM Authentication January 2006 + + + Peer Authenticator + | | + | +------------------------------+ + | | Server does not have a | + | | Subscriber identity available| + | | When starting EAP-SIM | + | +------------------------------+ + | EAP-Request/SIM/Start | + | (Includes AT_ANY_ID_REQ, AT_VERSION_LIST) | + |<------------------------------------------------------| + | | + | EAP-Response/SIM/Start | + | (AT_IDENTITY with fast re-auth. identity) | + |------------------------------------------------------>| + | | + | +------------------------------+ + | | Server does not accept | + | | The fast re-auth. | + | | Identity | + | +------------------------------+ + | EAP-Request/SIM/Start | + | (AT_FULLAUTH_ID_REQ, AT_VERSION_LIST) | + |<------------------------------------------------------| + | | + : : + : : + : : + : : + |EAP-Response/SIM/Start | + |(AT_IDENTITY with a pseudonym identity, AT_NONCE_MT, | + | AT_SELECTED_VERSION) | + |------------------------------------------------------>| + | | + | +-------------------------------+ + | | Server fails to map the | + | | Pseudonym in AT_IDENTITY | + | | to a valid permanent identity | + | +-------------------------------+ + | EAP-Request/SIM/Start | + | (AT_PERMANENT_ID_REQ, AT_VERSION_LIST) | + |<------------------------------------------------------| + | | + | EAP-Response/SIM/Start | + | (AT_IDENTITY with permanent identity, AT_NONCE_MT, | + | AT_SELECTED_VERSION) | + |------------------------------------------------------>| + | | + Figure 7: Three EAP-SIM Start rounds + + + +Haverinen & Salowey Informational [Page 29] + +RFC 4186 EAP-SIM Authentication January 2006 + + + After the last EAP-Response/SIM/Start message, the full + authentication sequence proceeds as usual. If the EAP Server + recognizes the permanent identity and is able to proceed, the server + issues the EAP-Request/SIM/Challenge message. + +5. Fast Re-Authentication + +5.1. General + + In some environments, EAP authentication may be performed frequently. + Because the EAP-SIM full authentication procedure makes use of the + GSM SIM A3/A8 algorithms, and therefore requires 2 or 3 fresh + triplets from the Authentication Centre, the full authentication + procedure is not very well suited for frequent use. Therefore, + EAP-SIM includes a more inexpensive fast re-authentication procedure + that does not make use of the SIM A3/A8 algorithms and does not need + new triplets from the Authentication Centre. Re-authentication can + be performed in fewer roundtrips than the full authentication. + + Fast re-authentication is optional to implement for both the EAP-SIM + server and peer. On each EAP authentication, either one of the + entities may also fall back on full authentication if it does not + want to use fast re-authentication. + + Fast re-authentication is based on the keys derived on the preceding + full authentication. The same K_aut and K_encr keys that were used + in full authentication are used to protect EAP-SIM packets and + attributes, and the original Master Key from full authentication is + used to generate a fresh Master Session Key, as specified in Section + 7. + + The fast re-authentication exchange makes use of an unsigned 16-bit + counter, included in the AT_COUNTER attribute. The counter has three + goals: 1) it can be used to limit the number of successive + reauthentication exchanges without full authentication 2) it + contributes to the keying material, and 3) it protects the peer and + the server from replays. On full authentication, both the server and + the peer initialize the counter to one. The counter value of at + least one is used on the first fast re-authentication. On subsequent + fast re-authentications, the counter MUST be greater than on any of + the previous re-authentications. For example, on the second fast + re-authentication, the counter value is two or greater. The + AT_COUNTER attribute is encrypted. + + Both the peer and the EAP server maintain a copy of the counter. The + EAP server sends its counter value to the peer in the fast + re-authentication request. The peer MUST verify that its counter + value is less than or equal to the value sent by the EAP server. + + + +Haverinen & Salowey Informational [Page 30] + +RFC 4186 EAP-SIM Authentication January 2006 + + + The server includes an encrypted server random nonce (AT_NONCE_S) in + the fast re-authentication request. The AT_MAC attribute in the + peer's response is calculated over NONCE_S to provide a + challenge/response authentication scheme. The NONCE_S also + contributes to the new Master Session Key. + + Both the peer and the server SHOULD have an upper limit for the + number of subsequent fast re-authentications allowed before a full + authentication needs to be performed. Because a 16-bit counter is + used in fast re-authentication, the theoretical maximum number of + re-authentications is reached when the counter value reaches FFFF + hexadecimal. + + In order to use fast re-authentication, the peer and the EAP server + need to store the following values: Master Key, latest counter value + and the next fast re-authentication identity. K_aut, K_encr may + either be stored or derived again from MK. The server may also need + to store the permanent identity of the user. + +5.2. Comparison to UMTS AKA + + When analyzing the fast re-authentication exchange, it may be helpful + to compare it with the UMTS Authentication and Key Agreement (AKA) + exchange, which it resembles closely. The counter corresponds to the + UMTS AKA sequence number, NONCE_S corresponds to RAND, AT_MAC in + EAP-Request/SIM/Re-authentication corresponds to AUTN, the AT_MAC in + EAP-Response/SIM/Re-authentication corresponds to RES, + AT_COUNTER_TOO_SMALL corresponds to AUTS, and encrypting the counter + corresponds to the usage of the Anonymity Key. Also, the key + generation on fast re-authentication, with regard to random or fresh + material, is similar to UMTS AKA -- the server generates the NONCE_S + and counter values, and the peer only verifies that the counter value + is fresh. + + It should also be noted that encrypting the AT_NONCE_S, AT_COUNTER, + or AT_COUNTER_TOO_SMALL attributes is not important to the security + of the fast re-authentication exchange. + +5.3. Fast Re-authentication Identity + + The fast re-authentication procedure makes use of separate + re-authentication user identities. Pseudonyms and the permanent + identity are reserved for full authentication only. If a + re-authentication identity is lost and the network does not recognize + it, the EAP server can fall back on full authentication. + + + + + + +Haverinen & Salowey Informational [Page 31] + +RFC 4186 EAP-SIM Authentication January 2006 + + + If the EAP server supports fast re-authentication, it MAY include the + skippable AT_NEXT_REAUTH_ID attribute in the encrypted data of + EAP-Request/SIM/Challenge message (Section 9.3). This attribute + contains a new fast re-authentication identity for the next fast + re-authentication. The attribute also works as a capability flag + that, indicating that the server supports fast re-authentication, and + that the server wants to continue using fast re-authentication within + the current context. The peer MAY ignore this attribute, in which + case it MUST use full authentication next time. If the peer wants to + use re-authentication, it uses this fast re-authentication identity + on next authentication. Even if the peer has a fast + re-authentication identity, the peer MAY discard the fast + re-authentication identity and use a pseudonym or the permanent + identity instead, in which case full authentication MUST be + performed. If the EAP server does not include the AT_NEXT_REAUTH_ID + in the encrypted data of EAP-Request/SIM/Challenge or + EAP-Request/SIM/ Re-authentication, then the peer MUST discard its + current fast re-authentication state information and perform a full + authentication next time. + + In environments where a realm portion is needed in the peer identity, + the fast re-authentication identity received in AT_NEXT_REAUTH_ID + MUST contain both a username portion and a realm portion, as per the + NAI format. The EAP Server can choose an appropriate realm part in + order to have the AAA infrastructure route subsequent fast + re-authentication related requests to the same AAA server. For + example, the realm part MAY include a portion that is specific to the + AAA server. Hence, it is sufficient to store the context required + for fast re-authentication in the AAA server that performed the full + authentication. + + The peer MAY use the fast re-authentication identity in the + EAP-Response/Identity packet or, in response to the server's + AT_ANY_ID_REQ attribute, the peer MAY use the fast re-authentication + identity in the AT_IDENTITY attribute of the EAP-Response/SIM/Start + packet. + + The peer MUST NOT modify the username portion of the fast + re-authentication identity, but the peer MAY modify the realm portion + or replace it with another realm portion. The peer might need to + modify the realm in order to influence the AAA routing, for example, + to make sure that the correct server is reached. It should be noted + that sharing the same fast re-authentication key among several + servers may have security risks, so changing the realm portion of the + NAI in order to change the EAP server is not desirable. + + + + + + +Haverinen & Salowey Informational [Page 32] + +RFC 4186 EAP-SIM Authentication January 2006 + + + Even if the peer uses a fast re-authentication identity, the server + may want to fall back on full authentication, for example because the + server does not recognize the fast re-authentication identity or does + not want to use fast re-authentication. In this case, the server + starts the full authentication procedure by issuing an + EAP-Request/SIM/Start packet. This packet always starts a full + authentication sequence if it does not include the AT_ANY_ID_REQ + attribute. If the server was not able to recover the peer's identity + from the fast re-authentication identity, the server includes either + the AT_FULLAUTH_ID_REQ or the AT_PERMANENT_ID_REQ attribute in this + EAP request. + +5.4. Fast Re-authentication Procedure + + Figure 8 illustrates the fast re-authentication procedure. In this + example, the optional protected success indication is not used. + Encrypted attributes are denoted with '*'. The peer uses its + re-authentication identity in the EAP-Response/Identity packet. As + discussed above, an alternative way to communicate the + re-authentication identity to the server is for the peer to use the + AT_IDENTITY attribute in the EAP-Response/SIM/Start message. This + latter case is not illustrated in the figure below, and it is only + possible when the server requests that the peer send its identity by + including the AT_ANY_ID_REQ attribute in the EAP-Request/SIM/Start + packet. + + If the server recognizes the identity as a valid fast + re-authentication identity, and if the server agrees to use fast + re-authentication, then the server sends the EAP-Request/SIM/ + Re-authentication packet to the peer. This packet MUST include the + encrypted AT_COUNTER attribute, with a fresh counter value, the + encrypted AT_NONCE_S attribute that contains a random number chosen + by the server, the AT_ENCR_DATA and the AT_IV attributes used for + encryption, and the AT_MAC attribute that contains a message + authentication code over the packet. The packet MAY also include an + encrypted AT_NEXT_REAUTH_ID attribute that contains the next fast + re-authentication identity. + + Fast re-authentication identities are one-time identities. If the + peer does not receive a new fast re-authentication identity, it MUST + use either the permanent identity or a pseudonym identity on the next + authentication to initiate full authentication. + + The peer verifies that AT_MAC is correct, and that the counter value + is fresh (greater than any previously used value). The peer MAY save + the next fast re-authentication identity from the encrypted + AT_NEXT_REAUTH_ID for next time. If all checks are successful, the + peer responds with the EAP-Response/SIM/Re-authentication packet, + + + +Haverinen & Salowey Informational [Page 33] + +RFC 4186 EAP-SIM Authentication January 2006 + + + including the AT_COUNTER attribute with the same counter value and + AT_MAC attribute. + + The server verifies the AT_MAC attribute and also verifies that the + counter value is the same that it used in the EAP-Request/SIM/ + Re-authentication packet. If these checks are successful, the + re-authentication has succeeded and the server sends the EAP-Success + packet to the peer. + + If protected success indications (Section 6.2) were used, the + EAP-Success packet would be preceded by an EAP-SIM notification + round. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Haverinen & Salowey Informational [Page 34] + +RFC 4186 EAP-SIM Authentication January 2006 + + + Peer Authenticator + | | + | EAP-Request/Identity | + |<------------------------------------------------------| + | | + | EAP-Response/Identity | + | (Includes a fast re-authentication identity) | + |------------------------------------------------------>| + | | + | +--------------------------------+ + | | Server recognizes the identity | + | | and agrees to use fast | + | | re-authentication | + | +--------------------------------+ + | | + : : + : : + : : + : : + | EAP-Request/SIM/Re-authentication | + | (AT_IV, AT_ENCR_DATA, *AT_COUNTER, | + | *AT_NONCE_S, *AT_NEXT_REAUTH_ID, AT_MAC) | + |<------------------------------------------------------| + | | + +-----------------------------------------------+ | + | Peer verifies AT_MAC and the freshness of | | + | the counter. Peer MAY store the new fast re- | | + | authentication identity for next re-auth. | | + +-----------------------------------------------+ | + | | + | EAP-Response/SIM/Re-authentication | + | (AT_IV, AT_ENCR_DATA, *AT_COUNTER with same value, | + | AT_MAC) | + |------------------------------------------------------>| + | +--------------------------------+ + | | Server verifies AT_MAC and | + | | the counter | + | +--------------------------------+ + | | + | EAP-Success | + |<------------------------------------------------------| + | | + + Figure 8: Fast Re-authentication + + + + + + + +Haverinen & Salowey Informational [Page 35] + +RFC 4186 EAP-SIM Authentication January 2006 + + +5.5. Fast Re-authentication Procedure when Counter Is Too Small + + If the peer does not accept the counter value of EAP-Request/SIM/ + Re-authentication, it indicates the counter synchronization problem + by including the encrypted AT_COUNTER_TOO_SMALL in EAP-Response/SIM/ + Re-authentication. The server responds with EAP-Request/SIM/Start to + initiate a normal full authentication procedure. This is illustrated + in Figure 9. Encrypted attributes are denoted with '*'. + + Peer Authenticator + | EAP-Request/SIM/Start | + | (AT_ANY_ID_REQ, AT_VERSION_LIST) | + |<------------------------------------------------------| + | | + | EAP-Response/SIM/Start | + | (AT_IDENTITY) | + | (Includes a fast re-authentication identity) | + |------------------------------------------------------>| + | | + | EAP-Request/SIM/Re-authentication | + | (AT_IV, AT_ENCR_DATA, *AT_COUNTER, | + | *AT_NONCE_S, *AT_NEXT_REAUTH_ID, AT_MAC) | + |<------------------------------------------------------| + +-----------------------------------------------+ | + | AT_MAC is valid but the counter is not fresh. | | + +-----------------------------------------------+ | + | | + | EAP-Response/SIM/Re-authentication | + | (AT_IV, AT_ENCR_DATA, *AT_COUNTER_TOO_SMALL, | + | *AT_COUNTER, AT_MAC) | + |------------------------------------------------------>| + | +----------------------------------------------+ + | | Server verifies AT_MAC but detects | + | | That peer has included AT_COUNTER_TOO_SMALL | + | +----------------------------------------------+ + | | + | EAP-Request/SIM/Start | + | (AT_VERSION_LIST) | + |<------------------------------------------------------| + +---------------------------------------------------------------+ + | Normal full authentication follows. | + +---------------------------------------------------------------+ + | | + + Figure 9: Fast Re-authentication, counter is not fresh + + + + + + +Haverinen & Salowey Informational [Page 36] + +RFC 4186 EAP-SIM Authentication January 2006 + + + In the figure above, the first three messages are similar to the + basic fast re-authentication case. When the peer detects that the + counter value is not fresh, it includes the AT_COUNTER_TOO_SMALL + attribute in EAP-Response/SIM/Re-authentication. This attribute + doesn't contain any data, but it is a request for the server to + initiate full authentication. In this case, the peer MUST ignore the + contents of the server's AT_NEXT_REAUTH_ID attribute. + + On receipt of AT_COUNTER_TOO_SMALL, the server verifies AT_MAC and + verifies that AT_COUNTER contains the same counter value as in the + EAP-Request/SIM/Re-authentication packet. If not, the server + terminates the authentication exchange by sending the + EAP-Request/SIM/Notification with AT_NOTIFICATION code "General + failure" (16384). If all checks on the packet are successful, the + server transmits a new EAP-Request/SIM/Start packet and the full + authentication procedure is performed as usual. Since the server + already knows the subscriber identity, it MUST NOT include + AT_ANY_ID_REQ, AT_FULLAUTH_ID_REQ, or AT_PERMANENT_ID_REQ in the + EAP-Request/SIM/Start. + + It should be noted that in this case, peer identity is only + transmitted in the AT_IDENTITY attribute at the beginning of the + whole EAP exchange. The fast re-authentication identity used in this + AT_IDENTITY attribute will be used in key derivation (see Section 7). + +6. EAP-SIM Notifications + +6.1. General + + EAP-SIM does not prohibit the use of the EAP Notifications as + specified in [RFC3748]. EAP Notifications can be used at any time in + the EAP-SIM exchange. It should be noted that EAP-SIM does not + protect EAP Notifications. EAP-SIM also specifies method-specific + EAP-SIM notifications that are protected in some cases. + + The EAP server can use EAP-SIM notifications to convey notifications + and result indications (Section 6.2) to the peer. + + The server MUST use notifications in cases discussed in + Section 6.3.2. When the EAP server issues an + EAP-Request/SIM/Notification packet to the peer, the peer MUST + process the notification packet. The peer MAY show a notification + message to the user and the peer MUST respond to the EAP server with + an EAP-Response/SIM/Notification packet, even if the peer did not + recognize the notification code. + + + + + + +Haverinen & Salowey Informational [Page 37] + +RFC 4186 EAP-SIM Authentication January 2006 + + + An EAP-SIM full authentication exchange or a fast re-authentication + exchange MUST NOT include more than one EAP-SIM notification round. + + The notification code is a 16-bit number. The most significant bit + is called the Success bit (S bit). The S bit specifies whether the + notification implies failure. The code values with the S bit set to + zero (code values 0...32767) are used on unsuccessful cases. The + receipt of a notification code from this range implies a failed EAP + exchange, so the peer can use the notification as a failure + indication. After receiving the EAP-Response/SIM/Notification for + these notification codes, the server MUST send the EAP-Failure + packet. + + The receipt of a notification code with the S bit set to one (values + 32768...65536) does not imply failure. Notification code "Success" + (32768) has been reserved as a general notification code to indicate + successful authentication. + + The second most significant bit of the notification code is called + the Phase bit (P bit). It specifies at which phase of the EAP-SIM + exchange the notification can be used. If the P bit is set to zero, + the notification can only be used after a successful + EAP/SIM/Challenge round in full authentication or a successful + EAP/SIM/Re-authentication round in reauthentication. A + re-authentication round is considered successful only if the peer has + successfully verified AT_MAC and AT_COUNTER attributes, and does not + include the AT_COUNTER_TOO_SMALL attribute in + EAP-Response/SIM/Re-authentication. + + If the P bit is set to one, the notification can only by used before + the EAP/SIM/Challenge round in full authentication, or before the + EAP/SIM/Re-authentication round in reauthentication. These + notifications can only be used to indicate various failure cases. In + other words, if the P bit is set to one, then the S bit MUST be set + to zero. + + Section 9.8 and Section 9.9 specify what other attributes must be + included in the notification packets. + + Some of the notification codes are authorization related and, hence, + are not usually considered part of the responsibility of an EAP + method. However, they are included as part of EAP-SIM because there + are currently no other ways to convey this information to the user in + a localizable way, and the information is potentially useful for the + user. An EAP-SIM server implementation may decide never to send + these EAP-SIM notifications. + + + + + +Haverinen & Salowey Informational [Page 38] + +RFC 4186 EAP-SIM Authentication January 2006 + + +6.2. Result Indications + + As discussed in Section 6.3, the server and the peer use explicit + error messages in all error cases. If the server detects an error + after successful authentication, the server uses an EAP-SIM + notification to indicate failure to the peer. In this case, the + result indication is integrity and replay protected. + + By sending an EAP-Response/SIM/Challenge packet or an + EAP-Response/SIM/Re-authentication packet (without + AT_COUNTER_TOO_SMALL), the peer indicates that it has successfully + authenticated the server and that the peer's local policy accepts the + EAP exchange. In other words, these packets are implicit success + indications from the peer to the server. + + EAP-SIM also supports optional protected success indications from the + server to the peer. If the EAP server wants to use protected success + indications, it includes the AT_RESULT_IND attribute in the + EAP-Request/SIM/Challenge or the EAP-Request/SIM/Re-authentication + packet. This attribute indicates that the EAP server would like to + use result indications in both successful and unsuccessful cases. If + the peer also wants this, the peer includes AT_RESULT_IND in + EAP-Response/SIM/Challenge or EAP-Response/SIM/Re-authentication. + The peer MUST NOT include AT_RESULT_IND if it did not receive + AT_RESULT_IND from the server. If both the peer and the server used + AT_RESULT_IND, then the EAP exchange is not complete yet, but an + EAP-SIM notification round will follow. The following EAP-SIM + notification may indicate either failure or success. + + Success indications with the AT_NOTIFICATION code "Success" (32768) + can only be used if both the server and the peer indicate they want + to use them with AT_RESULT_IND. If the server did not include + AT_RESULT_IND in the EAP-Request/SIM/Challenge or + EAP-Request/SIM/Re-authentication packet, or if the peer did not + include AT_RESULT_IND in the corresponding response packet, then the + server MUST NOT use protected success indications. + + Because the server uses the AT_NOTIFICATION code "Success" (32768) to + indicate that the EAP exchange has completed successfully, the EAP + exchange cannot fail when the server processes the EAP-SIM response + to this notification. Hence, the server MUST ignore the contents of + the EAP-SIM response it receives from the + EAP-Request/SIM/Notification with this code. Regardless of the + contents of the EAP-SIM response, the server MUST send EAP-Success as + the next packet. + + + + + + +Haverinen & Salowey Informational [Page 39] + +RFC 4186 EAP-SIM Authentication January 2006 + + +6.3. Error Cases + + This section specifies the operation of the peer and the server in + error cases. The subsections below require the EAP-SIM peer and + server to send an error packet (EAP-Response/SIM/Client-Error from + the peer or EAP-Request/SIM/Notification from the server) in error + cases. However, implementations SHOULD NOT rely upon the correct + error reporting behavior of the peer, authenticator, or the server. + It is possible for error and other messages to be lost in transit or + for a malicious participant to attempt to consume resources by not + issuing error messages. Both the peer and the EAP server SHOULD have + a mechanism to clean up state, even if an error message or + EAP-Success is not received after a timeout period. + +6.3.1. Peer Operation + + In general, if an EAP-SIM peer detects an error in a received EAP-SIM + packet, the EAP-SIM implementation responds with the + EAP-Response/SIM/Client-Error packet. In response to the + EAP-Response/SIM/Client-Error, the EAP server MUST issue the + EAP-Failure packet and the authentication exchange terminates. + + By default, the peer uses the client error code 0, "unable to process + packet". This error code is used in the following cases: + + o EAP exchange is not acceptable according to the peer's local + policy. + + o the peer is not able to parse the EAP request, i.e., the EAP + request is malformed. + + o the peer encountered a malformed attribute. + + o wrong attribute types or duplicate attributes have been included + in the EAP request. + + o a mandatory attribute is missing. + + o unrecognized, non-skippable attribute. + + o unrecognized or unexpected EAP-SIM Subtype in the EAP request. + + o A RAND challenge repeated in AT_RAND. + + o invalid AT_MAC. The peer SHOULD log this event. + + o invalid pad bytes in AT_PADDING. + + + + +Haverinen & Salowey Informational [Page 40] + +RFC 4186 EAP-SIM Authentication January 2006 + + + o the peer does not want to process AT_PERMANENT_ID_REQ. + + Separate error codes have been defined for the following error cases + in Section 10.19: + + As specified in Section 4.1, when processing the AT_VERSION_LIST + attribute, which lists the EAP-SIM versions supported by the server, + if the attribute does not include a version that is implemented by + the peer and allowed in the peer's security policy, then the peer + MUST send the EAP-Response/SIM/Client-Error packet with the error + code "unsupported version". + + If the number of RAND challenges is smaller than what is required by + peer's local policy when processing the AT_RAND attribute, the peer + MUST send the EAP-Response/SIM/Client-Error packet with the error + code "insufficient number of challenges". + + If the peer believes that the RAND challenges included in AT_RAND are + not fresh e.g., because it is capable of remembering some previously + used RANDs, the peer MUST send the EAP-Response/SIM/Client-Error + packet with the error code "RANDs are not fresh". + +6.3.2. Server Operation + + If an EAP-SIM server detects an error in a received EAP-SIM response, + the server MUST issue the EAP-Request/SIM/Notification packet with an + AT_NOTIFICATION code that implies failure. By default, the server + uses one of the general failure codes ("General failure after + authentication" (0), or "General failure" (16384)). The choice + between these two codes depends on the phase of the EAP-SIM exchange, + see Section 6. When the server issues an EAP- + Request/SIM/Notification that implies failure, the error cases + include the following: + + o the server is not able to parse the peer's EAP response + + o the server encounters a malformed attribute, a non-recognized + non-skippable attribute, or a duplicate attribute + + o a mandatory attribute is missing or an invalid attribute was + included + + o unrecognized or unexpected EAP-SIM Subtype in the EAP Response + + o invalid AT_MAC. The server SHOULD log this event. + + o invalid AT_COUNTER + + + + +Haverinen & Salowey Informational [Page 41] + +RFC 4186 EAP-SIM Authentication January 2006 + + +6.3.3. EAP-Failure + + The EAP-SIM server sends EAP-Failure in two cases: + + 1) In response to an EAP-Response/SIM/Client-Error packet the server + has received from the peer, or + + 2) Following an EAP-SIM notification round, when the AT_NOTIFICATION + code implies failure. + + The EAP-SIM server MUST NOT send EAP-Failure in cases other than + these two. However, it should be noted that even though the EAP-SIM + server would not send an EAP-Failure, an authorization decision that + happens outside EAP-SIM, such as in the AAA server or in an + intermediate AAA proxy, may result in a failed exchange. + + The peer MUST accept the EAP-Failure packet in case 1) and case 2), + above. The peer SHOULD silently discard the EAP-Failure packet in + other cases. + +6.3.4. EAP-Success + + On full authentication, the server can only send EAP-Success after + the EAP/SIM/Challenge round. The peer MUST silently discard any + EAP-Success packets if they are received before the peer has + successfully authenticated the server and sent the + EAP-Response/SIM/Challenge packet. + + If the peer did not indicate that it wants to use protected success + indications with AT_RESULT_IND (as discussed in Section 6.2) on full + authentication, then the peer MUST accept EAP-Success after a + successful EAP/SIM/Challenge round. + + If the peer indicated that it wants to use protected success + indications with AT_RESULT_IND (as discussed in Section 6.2), then + the peer MUST NOT accept EAP-Success after a successful + EAP/SIM/Challenge round. In this case, the peer MUST only accept + EAP-Success after receiving an EAP-SIM Notification with the + AT_NOTIFICATION code "Success" (32768). + + On fast re-authentication, EAP-Success can only be sent after the + EAP/SIM/Re-authentication round. The peer MUST silently discard any + EAP-Success packets if they are received before the peer has + successfully authenticated the server and sent the + EAP-Response/SIM/Re-authentication packet. + + If the peer did not indicate that it wants to use protected success + indications with AT_RESULT_IND (as discussed in Section 6.2) on fast + + + +Haverinen & Salowey Informational [Page 42] + +RFC 4186 EAP-SIM Authentication January 2006 + + + re-authentication, then the peer MUST accept EAP-Success after a + successful EAP/SIM/Re-authentication round. + + If the peer indicated that it wants to use protected success + indications with AT_RESULT_IND (as discussed in Section 6.2), then + the peer MUST NOT accept EAP-Success after a successful EAP/SIM/Re- + authentication round. In this case, the peer MUST only accept + EAP-Success after receiving an EAP-SIM Notification with the + AT_NOTIFICATION code "Success" (32768). + + If the peer receives an EAP-SIM notification (Section 6) that + indicates failure, then the peer MUST no longer accept the + EAP-Success packet, even if the server authentication was + successfully completed. + +7. Key Generation + + This section specifies how keying material is generated. + + On EAP-SIM full authentication, a Master Key (MK) is derived from the + underlying GSM authentication values (Kc keys), the NONCE_MT, and + other relevant context as follows. + + MK = SHA1(Identity|n*Kc| NONCE_MT| Version List| Selected Version) + + In the formula above, the "|" character denotes concatenation. + "Identity" denotes the peer identity string without any terminating + null characters. It is the identity from the last AT_IDENTITY + attribute sent by the peer in this exchange, or, if AT_IDENTITY was + not used, it is the identity from the EAP-Response/Identity packet. + The identity string is included as-is, without any changes. As + discussed in Section 4.2.2.2, relying on EAP-Response/Identity for + conveying the EAP-SIM peer identity is discouraged, and the server + SHOULD use the EAP-SIM method-specific identity attributes. + + The notation n*Kc in the formula above denotes the n Kc values + concatenated. The Kc keys are used in the same order as the RAND + challenges in AT_RAND attribute. NONCE_MT denotes the NONCE_MT value + (not the AT_NONCE_MT attribute, but only the nonce value). The + Version List includes the 2-byte-supported version numbers from + AT_VERSION_LIST, in the same order as in the attribute. The Selected + Version is the 2-byte selected version from AT_SELECTED_VERSION. + Network byte order is used, just as in the attributes. The hash + function SHA-1 is specified in [SHA-1]. If several EAP/SIM/Start + roundtrips are used in an EAP-SIM exchange, then the NONCE_MT, + Version List and Selected version from the last EAP/SIM/Start round + are used, and the previous EAP/SIM/Start rounds are ignored. + + + + +Haverinen & Salowey Informational [Page 43] + +RFC 4186 EAP-SIM Authentication January 2006 + + + The Master Key is fed into a Pseudo-Random number Function (PRF) + which generates separate Transient EAP Keys (TEKs) for protecting + EAP-SIM packets, as well as a Master Session Key (MSK) for link layer + security, and an Extended Master Session Key (EMSK) for other + purposes. On fast re-authentication, the same TEKs MUST be used for + protecting EAP packets, but a new MSK and a new EMSK MUST be derived + from the original MK and from new values exchanged in the fast + re-authentication. + + EAP-SIM requires two TEKs for its own purposes; the authentication + key K_aut is to be used with the AT_MAC attribute, and the encryption + key K_encr is to be used with the AT_ENCR_DATA attribute. The same + K_aut and K_encr keys are used in full authentication and subsequent + fast re-authentications. + + Key derivation is based on the random number generation specified in + NIST Federal Information Processing Standards (FIPS) Publication + 186-2 [PRF]. The pseudo-random number generator is specified in the + change notice 1 (2001 October 5) of [PRF] (Algorithm 1). As + specified in the change notice (page 74), when Algorithm 1 is used as + a general-purpose pseudo-random number generator, the "mod q" term in + step 3.3 is omitted. The function G used in the algorithm is + constructed via the Secure Hash Standard, as specified in Appendix + 3.3 of the standard. It should be noted that the function G is very + similar to SHA-1, but the message padding is different. Please refer + to [PRF] for full details. For convenience, the random number + algorithm with the correct modification is cited in Appendix B. + + 160-bit XKEY and XVAL values are used, so b = 160. On each full + authentication, the Master Key is used as the initial secret seed-key + XKEY. The optional user input values (XSEED_j) in step 3.1 are set + to zero. + + On full authentication, the resulting 320-bit random numbers (x_0, + x_1, ..., x_m-1) are concatenated and partitioned into suitable-sized + chunks and used as keys in the following order: K_encr (128 bits), + K_aut (128 bits), Master Session Key (64 bytes), Extended Master + Session Key (64 bytes). + + On fast re-authentication, the same pseudo-random number generator + can be used to generate a new Master Session Key and a new Extended + Master Session Key. The seed value XKEY' is calculated as follows: + + XKEY' = SHA1(Identity|counter|NONCE_S| MK) + + In the formula above, the Identity denotes the fast re-authentication + identity, without any terminating null characters, from the + AT_IDENTITY attribute of the EAP-Response/SIM/Start packet, or, if + + + +Haverinen & Salowey Informational [Page 44] + +RFC 4186 EAP-SIM Authentication January 2006 + + + EAP-Response/SIM/Start was not used on fast re-authentication, it + denotes the identity string from the EAP-Response/Identity packet. + The counter denotes the counter value from the AT_COUNTER attribute + used in the EAP-Response/SIM/Re-authentication packet. The counter + is used in network byte order. NONCE_S denotes the 16-byte NONCE_S + value from the AT_NONCE_S attribute used in the + EAP-Request/SIM/Re-authentication packet. The MK is the Master Key + derived on the preceding full authentication. + + On fast re-authentication, the pseudo-random number generator is run + with the new seed value XKEY', and the resulting 320-bit random + numbers (x_0, x_1, ..., x_m-1) are concatenated and partitioned into + two 64-byte chunks and used as the new 64-byte Master Session Key and + the new 64-byte Extended Master Session Key. Note that because + K_encr and K_aut are not derived on fast re-authentication, the + Master Session Key and the Extended Master Session key are obtained + from the beginning of the key stream (x_0, x_1, ...). + + The first 32 bytes of the MSK can be used as the Pairwise Master Key + (PMK) for IEEE 802.11i. + + When the RADIUS attributes specified in [RFC2548] are used to + transport keying material, then the first 32 bytes of the MSK + correspond to MS-MPPE-RECV-KEY and the second 32 bytes to + MS-MPPE-SEND-KEY. In this case, only 64 bytes of keying material + (the MSK) are used. + + When generating the initial Master Key, the hash function is used as + a mixing function to combine several session keys (Kc's) generated by + the GSM authentication procedure and the random number NONCE_MT into + a single session key. There are several reasons for this. The + current GSM session keys are, at most, 64 bits, so two or more of + them are needed to generate a longer key. By using a one-way + function to combine the keys, we are assured that, even if an + attacker managed to learn one of the EAP-SIM session keys, it + wouldn't help him in learning the original GSM Kc's. In addition, + since we include the random number NONCE_MT in the calculation, the + peer is able to verify that the EAP-SIM packets it receives from the + network are fresh and not replays (also see Section 11). + +8. Message Format and Protocol Extensibility + +8.1. Message Format + + As specified in [RFC3748], EAP packets begin with the Code, + Identifiers, Length, and Type fields, which are followed by EAP- + method-specific Type-Data. The Code field in the EAP header is set + to 1 for EAP requests, and to 2 for EAP Responses. The usage of the + + + +Haverinen & Salowey Informational [Page 45] + +RFC 4186 EAP-SIM Authentication January 2006 + + + Length and Identifier fields in the EAP header are also specified in + [RFC3748]. In EAP-SIM, the Type field is set to 18. + + In EAP-SIM, the Type-Data begins with an EAP-SIM header that consists + of a 1-octet Subtype field and a 2-octet reserved field. The Subtype + values used in EAP-SIM are defined in the IANA considerations section + of the EAP-AKA specification [EAP-AKA]. The formats of the EAP + header and the EAP-SIM header are shown below. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Code | Identifier | Length | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type | Subtype | Reserved | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + The rest of the Type-Data that immediately follows the EAP-SIM header + consists of attributes that are encoded in Type, Length, Value + format. The figure below shows the generic format of an attribute. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type | Length | Value... + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + + Attribute Type + + Indicates the particular type of attribute. The attribute type + values are listed in the IANA considerations section of the + EAP-AKA specification [EAP-AKA]. + + Length + + Indicates the length of this attribute in multiples of four + bytes. The maximum length of an attribute is 1024 bytes. The + length includes the Attribute Type and Length bytes. + + Value + + The particular data associated with this attribute. This field + is always included and it may be two or more bytes in length. + The type and length fields determine the format and length + of the value field. + + + + + +Haverinen & Salowey Informational [Page 46] + +RFC 4186 EAP-SIM Authentication January 2006 + + + Attributes numbered within the range 0 through 127 are called + non-skippable attributes. When an EAP-SIM peer encounters a + non-skippable attribute that the peer does not recognize, the peer + MUST send the EAP-Response/SIM/Client-Error packet, which terminates + the authentication exchange. If an EAP-SIM server encounters a + non-skippable attribute that the server does not recognize, then the + server sends the EAP-Request/SIM/Notification packet with an + AT_NOTIFICATION code, which implies general failure ("General failure + after authentication" (0), or "General failure" (16384), depending on + the phase of the exchange), which terminates the authentication + exchange. + + Attributes within the range of 128 through 255 are called skippable + attributes. When a skippable attribute is encountered and is not + recognized, it is ignored. The rest of the attributes and message + data MUST still be processed. The Length field of the attribute is + used to skip the attribute value in searching for the next attribute. + + Unless otherwise specified, the order of the attributes in an EAP-SIM + message is insignificant and an EAP-SIM implementation should not + assume a certain order to be used. + + Attributes can be encapsulated within other attributes. In other + words, the value field of an attribute type can be specified to + contain other attributes. + +8.2. Protocol Extensibility + + EAP-SIM can be extended by specifying new attribute types. If + skippable attributes are used, it is possible to extend the protocol + without breaking old implementations. + + However, any new attributes added to the EAP-Request/SIM/Start or + EAP-Response/SIM/Start packets would not be integrity-protected. + Therefore, these messages MUST NOT be extended in the current version + of EAP-SIM. If the list of supported EAP-SIM versions in the + AT_VERSION_LIST does not include versions other than 1, then the + server MUST NOT include attributes other than those specified in this + document in the EAP-Request/SIM/Start message. Note that future + versions of this protocol might specify new attributes for + EAP-Request/SIM/Start and still support version 1 of the protocol. + In this case, the server might send an EAP-Request/SIM/Start message + that includes new attributes and indicates support for protocol + version 1 and other versions in the AT_VERSION_LIST attribute. If + the peer selects version 1, then the peer MUST ignore any other + attributes included in EAP-Request/SIM/Start, other than those + specified in this document. If the selected EAP-SIM version in + peer's AT_SELECTED_VERSION is 1, then the peer MUST NOT include other + + + +Haverinen & Salowey Informational [Page 47] + +RFC 4186 EAP-SIM Authentication January 2006 + + + attributes aside from those specified in this document in the + EAP-Response/SIM/Start message. + + When specifying new attributes, it should be noted that EAP-SIM does + not support message fragmentation. Hence, the sizes of the new + extensions MUST be limited so that the maximum transfer unit (MTU) of + the underlying lower layer is not exceeded. According to [RFC3748], + lower layers must provide an EAP MTU of 1020 bytes or greater, so any + extensions to EAP-SIM SHOULD NOT exceed the EAP MTU of 1020 bytes. + + Because EAP-SIM supports version negotiation, new versions of the + protocol can also be specified by using a new version number. + +9. Messages + + This section specifies the messages used in EAP-SIM. It specifies + when a message may be transmitted or accepted, which attributes are + allowed in a message, which attributes are required in a message, and + other message-specific details. The general message format is + specified in Section 8.1. + +9.1. EAP-Request/SIM/Start + + In full authentication the first SIM-specific EAP Request is + EAP-Request/SIM/Start. The EAP/SIM/Start roundtrip is used for two + purposes. In full authentication this packet is used to request the + peer to send the AT_NONCE_MT attribute to the server. In addition, + as specified in Section 4.2, the Start round trip may be used by the + server for obtaining the peer identity. As discussed in Section 4.2, + several Start rounds may be required to obtain a valid peer identity. + + The server MUST always include the AT_VERSION_LIST attribute. + + The server MAY include one of the following identity-requesting + attributes: AT_PERMANENT_ID_REQ, AT_FULLAUTH_ID_REQ, or + AT_ANY_ID_REQ. These three attributes are mutually exclusive, so the + server MUST NOT include more than one of the attributes. + + If the server has received a response from the peer, it MUST NOT + issue a new EAP-Request/SIM/Start packet if it has previously issued + an EAP-Request/SIM/Start message either without any identity + requesting attributes or with the AT_PERMANENT_ID_REQ attribute. + + If the server has received a response from the peer, it MUST NOT + issue a new EAP-Request/SIM/Start packet with the AT_ANY_ID_REQ or + AT_FULLAUTH_ID_REQ attributes if it has previously issued an + EAP-Request/SIM/Start message with the AT_FULLAUTH_ID_REQ attribute. + + + + +Haverinen & Salowey Informational [Page 48] + +RFC 4186 EAP-SIM Authentication January 2006 + + + If the server has received a response from the peer, it MUST NOT + issue a new EAP-Request/SIM/Start packet with the AT_ANY_ID_REQ + attribute if the server has previously issued an + EAP-Request/SIM/Start message with the AT_ANY_ID_REQ attribute. + + This message MUST NOT include AT_MAC, AT_IV, or AT_ENCR_DATA. + +9.2. EAP-Response/SIM/Start + + The peer sends EAP-Response/SIM/Start in response to a valid + EAP-Request/SIM/Start from the server. + + If and only if the server's EAP-Request/SIM/Start includes one of the + identity-requesting attributes, then the peer MUST include the + AT_IDENTITY attribute. The usage of AT_IDENTITY is defined in + Section 4.2. + + The AT_NONCE_MT attribute MUST NOT be included if the AT_IDENTITY + with a fast re-authentication identity is present for fast + re-authentication. AT_NONCE_MT MUST be included in all other cases + (full authentication). + + The AT_SELECTED_VERSION attribute MUST NOT be included if the + AT_IDENTITY attribute with a fast re-authentication identity is + present for fast re-authentication. In all other cases, + AT_SELECTED_VERSION MUST be included (full authentication). This + attribute is used in version negotiation, as specified in + Section 4.1. + + This message MUST NOT include AT_MAC, AT_IV, or AT_ENCR_DATA. + +9.3. EAP-Request/SIM/Challenge + + The server sends the EAP-Request/SIM/Challenge after receiving a + valid EAP-Response/SIM/Start that contains AT_NONCE_MT and + AT_SELECTED_VERSION, and after successfully obtaining the subscriber + identity. + + The AT_RAND attribute MUST be included. + + The AT_RESULT_IND attribute MAY be included. The usage of this + attribute is discussed in Section 6.2. + + The AT_MAC attribute MUST be included. For + EAP-Request/SIM/Challenge, the MAC code is calculated over the + following data: + + EAP packet| NONCE_MT + + + +Haverinen & Salowey Informational [Page 49] + +RFC 4186 EAP-SIM Authentication January 2006 + + + The EAP packet is represented as specified in Section 8.1. It is + followed by the 16-byte NONCE_MT value from the peer's AT_NONCE_MT + attribute. + + The EAP-Request/SIM/Challenge packet MAY include encrypted attributes + for identity privacy and for communicating the next fast + re-authentication identity. In this case, the AT_IV and AT_ENCR_DATA + attributes are included (Section 10.12). + + The plaintext of the AT_ENCR_DATA value field consists of nested + attributes. The nested attributes MAY include AT_PADDING (as + specified in Section 10.12). If the server supports identity privacy + and wants to communicate a pseudonym to the peer for the next full + authentication, then the nested encrypted attributes include the + AT_NEXT_PSEUDONYM attribute. If the server supports + re-authentication and wants to communicate a fast re-authentication + identity to the peer, then the nested encrypted attributes include + the AT_NEXT_REAUTH_ID attribute. + + When processing this message, the peer MUST process AT_RAND before + processing other attributes. Only if AT_RAND is verified to be + valid, the peer derives keys and verifies AT_MAC. The operation in + case an error occurs is specified in Section 6.3.1. + +9.4. EAP-Response/SIM/Challenge + + The peer sends EAP-Response/SIM/Challenge in response to a valid + EAP-Request/SIM/Challenge. + + Sending this packet indicates that the peer has successfully + authenticated the server and that the EAP exchange will be accepted + by the peer's local policy. Hence, if these conditions are not met, + then the peer MUST NOT send EAP-Response/SIM/Challenge, but the peer + MUST send EAP-Response/SIM/Client-Error. + + The AT_MAC attribute MUST be included. For EAP- + Response/SIM/Challenge, the MAC code is calculated over the following + data: + + EAP packet| n*SRES + + The EAP packet is represented as specified in Section 8.1. The EAP + packet bytes are immediately followed by the two or three SRES values + concatenated, denoted above with the notation n*SRES. The SRES + values are used in the same order as the corresponding RAND + challenges in the server's AT_RAND attribute. + + + + + +Haverinen & Salowey Informational [Page 50] + +RFC 4186 EAP-SIM Authentication January 2006 + + + The AT_RESULT_IND attribute MAY be included if it was included in + EAP-Request/SIM/Challenge. The usage of this attribute is discussed + in Section 6.2. + + Later versions of this protocol MAY make use of the AT_ENCR_DATA and + AT_IV attributes in this message to include encrypted (skippable) + attributes. The EAP server MUST process EAP-Response/SIM/Challenge + messages that include these attributes even if the server did not + implement these optional attributes. + +9.5. EAP-Request/SIM/Re-authentication + + The server sends the EAP-Request/SIM/Re-authentication message if it + wants to use fast re-authentication, and if it has received a valid + fast re-authentication identity in EAP-Response/Identity or + EAP-Response/SIM/Start. + + AT_MAC MUST be included. No message-specific data is included in the + MAC calculation. See Section 10.14. + + The AT_RESULT_IND attribute MAY be included. The usage of this + attribute is discussed in Section 6.2. + + The AT_IV and AT_ENCR_DATA attributes MUST be included. The + plaintext consists of the following nested encrypted attributes, + which MUST be included: AT_COUNTER and AT_NONCE_S. In addition, the + nested encrypted attributes MAY include the following attributes: + AT_NEXT_REAUTH_ID and AT_PADDING. + +9.6. EAP-Response/SIM/Re-authentication + + The client sends the EAP-Response/SIM/Re-authentication packet in + response to a valid EAP-Request/SIM/Re-authentication. + + The AT_MAC attribute MUST be included. For + EAP-Response/SIM/Re-authentication, the MAC code is calculated over + the following data: + + EAP packet| NONCE_S + + The EAP packet is represented as specified in Section 8.1. It is + followed by the 16-byte NONCE_S value from the server's AT_NONCE_S + attribute. + + The AT_IV and AT_ENCR_DATA attributes MUST be included. The nested + encrypted attributes MUST include the AT_COUNTER attribute. The + AT_COUNTER_TOO_SMALL attribute MAY be included in the nested + + + + +Haverinen & Salowey Informational [Page 51] + +RFC 4186 EAP-SIM Authentication January 2006 + + + encrypted attributes, and it is included in cases specified in + Section 5. The AT_PADDING attribute MAY be included. + + The AT_RESULT_IND attribute MAY be included if it was included in + EAP-Request/SIM/Re-authentication. The usage of this attribute is + discussed in Section 6.2. + + Sending this packet without AT_COUNTER_TOO_SMALL indicates that the + peer has successfully authenticated the server and that the EAP + exchange will be accepted by the peer's local policy. Hence, if + these conditions are not met, then the peer MUST NOT send + EAP-Response/SIM/Re-authentication, but the peer MUST send + EAP-Response/SIM/Client-Error. + +9.7. EAP-Response/SIM/Client-Error + + The peer sends EAP-Response/SIM/Client-Error in error cases, as + specified in Section 6.3.1. + + The AT_CLIENT_ERROR_CODE attribute MUST be included. + + The AT_MAC, AT_IV, or AT_ENCR_DATA attributes MUST NOT be used with + this packet. + +9.8. EAP-Request/SIM/Notification + + The usage of this message is specified in Section 6. The + AT_NOTIFICATION attribute MUST be included. + + The AT_MAC attribute MUST be included if the P bit of the + notification code in AT_NOTIFICATION is set to zero, and MUST NOT be + included in cases when the P bit is set to one. The P bit is + discussed in Section 6. + + No message-specific data is included in the MAC calculation. See + Section 10.14. + + If EAP-Request/SIM/Notification is used on a fast re-authentication + exchange, and if the P bit in AT_NOTIFICATION is set to zero, then + AT_COUNTER is used for replay protection. In this case, the + AT_ENCR_DATA and AT_IV attributes MUST be included, and the + encapsulated plaintext attributes MUST include the AT_COUNTER + attribute. The counter value included in AT_COUNTER MUST be the same + as in the EAP-Request/SIM/Re-authentication packet on the same fast + re-authentication exchange. + + + + + + +Haverinen & Salowey Informational [Page 52] + +RFC 4186 EAP-SIM Authentication January 2006 + + +9.9. EAP-Response/SIM/Notification + + The usage of this message is specified in Section 6. This packet is + an acknowledgement of EAP-Request/SIM/Notification. + + The AT_MAC attribute MUST be included in cases when the P bit of the + notification code in AT_NOTIFICATION of EAP-Request/SIM/Notification + is set to zero, and MUST NOT be included in cases when the P bit is + set to one. The P bit is discussed in Section 6. + + No message-specific data is included in the MAC calculation, see + Section 10.14. + + If EAP-Request/SIM/Notification is used on a fast re-authentication + exchange, and if the P bit in AT_NOTIFICATION is set to zero, then + AT_COUNTER is used for replay protection. In this case, the + AT_ENCR_DATA and AT_IV attributes MUST be included, and the + encapsulated plaintext attributes MUST include the AT_COUNTER + attribute. The counter value included in AT_COUNTER MUST be the same + as in the EAP-Request/SIM/Re-authentication packet on the same fast + re-authentication exchange. + +10. Attributes + + This section specifies the format of message attributes. The + attribute type numbers are specified in the IANA considerations + section of the EAP-AKA specification [EAP-AKA]. + +10.1. Table of Attributes + + The following table provides a guide to which attributes may be found + in which kinds of messages, and in what quantity. Messages are + denoted with numbers in parentheses as follows: (1) + EAP-Request/SIM/Start, (2) EAP-Response/SIM/Start, (3) + EAP-Request/SIM/Challenge, (4) EAP-Response/SIM/Challenge, (5) + EAP-Request/SIM/Notification, (6) EAP-Response/SIM/Notification, (7) + EAP-Response/SIM/Client-Error, (8) EAP-Request/SIM/Re-authentication, + and (9) EAP-Response/SIM/Re-authentication. The column denoted with + "Encr" indicates whether the attribute is a nested attribute that + MUST be included within AT_ENCR_DATA, and the column denoted with + "Skip" indicates whether the attribute is a skippable attribute. + + "0" indicates that the attribute MUST NOT be included in the message, + "1" indicates that the attribute MUST be included in the message, + "0-1" indicates that the attribute is sometimes included in the + message, and "0*" indicates that the attribute is not included in the + message in cases specified in this document, but MAY be included in + future versions of the protocol. + + + +Haverinen & Salowey Informational [Page 53] + +RFC 4186 EAP-SIM Authentication January 2006 + + + Attribute (1) (2) (3) (4) (5) (6) (7) (8) (9) Encr Skip + AT_VERSION_LIST 1 0 0 0 0 0 0 0 0 N N + AT_SELECTED_VERSION 0 0-1 0 0 0 0 0 0 0 N N + AT_NONCE_MT 0 0-1 0 0 0 0 0 0 0 N N + AT_PERMANENT_ID_REQ 0-1 0 0 0 0 0 0 0 0 N N + AT_ANY_ID_REQ 0-1 0 0 0 0 0 0 0 0 N N + AT_FULLAUTH_ID_REQ 0-1 0 0 0 0 0 0 0 0 N N + AT_IDENTITY 0 0-1 0 0 0 0 0 0 0 N N + AT_RAND 0 0 1 0 0 0 0 0 0 N N + AT_NEXT_PSEUDONYM 0 0 0-1 0 0 0 0 0 0 Y Y + AT_NEXT_REAUTH_ID 0 0 0-1 0 0 0 0 0-1 0 Y Y + AT_IV 0 0 0-1 0* 0-1 0-1 0 1 1 N Y + AT_ENCR_DATA 0 0 0-1 0* 0-1 0-1 0 1 1 N Y + AT_PADDING 0 0 0-1 0* 0-1 0-1 0 0-1 0-1 Y N + AT_RESULT_IND 0 0 0-1 0-1 0 0 0 0-1 0-1 N Y + AT_MAC 0 0 1 1 0-1 0-1 0 1 1 N N + AT_COUNTER 0 0 0 0 0-1 0-1 0 1 1 Y N + AT_COUNTER_TOO_SMALL 0 0 0 0 0 0 0 0 0-1 Y N + AT_NONCE_S 0 0 0 0 0 0 0 1 0 Y N + AT_NOTIFICATION 0 0 0 0 1 0 0 0 0 N N + AT_CLIENT_ERROR_CODE 0 0 0 0 0 0 1 0 0 N N + + It should be noted that attributes AT_PERMANENT_ID_REQ, + AT_ANY_ID_REQ, and AT_FULLAUTH_ID_REQ are mutually exclusive; only + one of them can be included at the same time. If one of the + attributes AT_IV and AT_ENCR_DATA is included, then both of the + attributes MUST be included. + +10.2. AT_VERSION_LIST + + The format of the AT_VERSION_LIST attribute is shown below. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | AT_VERSION_L..| Length | Actual Version List Length | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Supported Version 1 | Supported Version 2 | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + . . + . . + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Supported Version N | Padding | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + This attribute is used in version negotiation, as specified in + Section 4.1. The attribute contains the version numbers supported by + the EAP-SIM server. The server MUST only include versions that it + + + +Haverinen & Salowey Informational [Page 54] + +RFC 4186 EAP-SIM Authentication January 2006 + + + implements and that are allowed in its security policy. The server + SHOULD list the versions in the order of preference, with the most + preferred versions listed first. At least one version number MUST be + included. The version number for the protocol described in this + document is one (0001 hexadecimal). + + The value field of this attribute begins with 2-byte Actual Version + List Length, which specifies the length of the Version List in bytes, + not including the Actual Version List Length attribute length. This + field is followed by the list of the versions supported by the + server, which each have a length of 2 bytes. For example, if there + is only one supported version, then the Actual Version List Length is + 2. Because the length of the attribute must be a multiple of 4 + bytes, the sender pads the value field with zero bytes when + necessary. + +10.3. AT_SELECTED_VERSION + + The format of the AT_SELECTED_VERSION attribute is shown below. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | AT_SELECTED...| Length = 1 | Selected Version | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + This attribute is used in version negotiation, as specified in + Section 4.1. The value field of this attribute contains a two-byte + version number, which indicates the EAP-SIM version that the peer + wants to use. + +10.4. AT_NONCE_MT + + The format of the AT_NONCE_MT attribute is shown below. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + |AT_NONCE_MT | Length = 5 | Reserved | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + | NONCE_MT | + | | + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + + + + + +Haverinen & Salowey Informational [Page 55] + +RFC 4186 EAP-SIM Authentication January 2006 + + + The value field of the NONCE_MT attribute contains two reserved bytes + followed by a random number freshly generated by the peer (16 bytes + long) for this EAP-SIM authentication exchange. The random number is + used as a seed value for the new keying material. The reserved bytes + are set to zero upon sending and ignored upon reception. + + The peer MUST NOT re-use the NONCE_MT value from a previous EAP-SIM + authentication exchange. If an EAP-SIM exchange includes several + EAP/SIM/Start rounds, then the peer SHOULD use the same NONCE_MT + value in all EAP-Response/SIM/Start packets. The peer SHOULD use a + good source of randomness to generate NONCE_MT. Please see [RFC4086] + for more information about generating random numbers for security + applications. + +10.5. AT_PERMANENT_ID_REQ + + The format of the AT_PERMANENT_ID_REQ attribute is shown below. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + |AT_PERM..._REQ | Length = 1 | Reserved | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + The use of the AT_PERMANENT_ID_REQ is defined in Section 4.2. The + value field contains only two reserved bytes, which are set to zero + on sending and ignored on reception. + +10.6. AT_ANY_ID_REQ + + The format of the AT_ANY_ID_REQ attribute is shown below. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + |AT_ANY_ID_REQ | Length = 1 | Reserved | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + The use of the AT_ANY_ID_REQ is defined in Section 4.2. The value + field contains only two reserved bytes, which are set to zero on + sending and ignored on reception. + + + + + + + + + + +Haverinen & Salowey Informational [Page 56] + +RFC 4186 EAP-SIM Authentication January 2006 + + +10.7. AT_FULLAUTH_ID_REQ + + The format of the AT_FULLAUTH_ID_REQ attribute is shown below. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + |AT_FULLAUTH_...| Length = 1 | Reserved | + +---------------+---------------+-------------------------------+ + + The use of the AT_FULLAUTH_ID_REQ is defined in Section 4.2. The + value field contains only two reserved bytes, which are set to zero + on sending and ignored on reception. + +10.8. AT_IDENTITY + + The format of the AT_IDENTITY attribute is shown below. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | AT_IDENTITY | Length | Actual Identity Length | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + . Identity (optional) . + . . + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + The use of the AT_IDENTITY is defined in Section 4.2. The value + field of this attribute begins with a 2-byte actual identity length, + which specifies the length of the identity in bytes. This field is + followed by the subscriber identity of the indicated actual length. + The identity is the permanent identity, a pseudonym identity, or a + fast re-authentication identity. The identity format is specified in + Section 4.2.1. The same identity format is used in the AT_IDENTITY + attribute and the EAP-Response/Identity packet, with the exception + that the peer MUST NOT decorate the identity it includes in + AT_IDENTITY. The identity does not include any terminating null + characters. Because the length of the attribute must be a multiple + of 4 bytes, the sender pads the identity with zero bytes when + necessary. + + + + + + + + + +Haverinen & Salowey Informational [Page 57] + +RFC 4186 EAP-SIM Authentication January 2006 + + +10.9. AT_RAND + + The format of the AT_RAND attribute is shown below. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | AT_RAND | Length | Reserved | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + . n*RAND . + . . + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + The value field of this attribute contains two reserved bytes + followed by n GSM RANDs, each 16 bytes long. The value of n can be + determined by the attribute length. The reserved bytes are set to + zero upon sending and ignored upon reception. + + The number of RAND challenges (n) MUST be two or three. The peer + MUST verify that the number of RAND challenges is sufficient + according to the peer's policy. The server MUST use different RAND + values. In other words, a RAND value can only be included once in + AT_RAND. When processing the AT_RAND attribute, the peer MUST check + that the RANDs are different. + + The EAP server MUST obtain fresh RANDs for each EAP-SIM full + authentication exchange. More specifically, the server MUST consider + RANDs it included in AT_RAND to be consumed if the server receives an + EAP-Response/SIM/Challenge packet with a valid AT_MAC, or an + EAP-Response/SIM/Client-Error with the code "insufficient number of + challenges" or "RANDs are not fresh". However, in other cases (if + the server does not receive a response to its + EAP-Request/SIM/Challenge packet, or if the server receives a + response other than the cases listed above), the server does not need + to consider the RANDs to be consumed, and the server MAY re-use the + RANDs in the AT_RAND attribute of the next full authentication + attempt. + + + + + + + + + + + + +Haverinen & Salowey Informational [Page 58] + +RFC 4186 EAP-SIM Authentication January 2006 + + +10.10. AT_NEXT_PSEUDONYM + + The format of the AT_NEXT_PSEUDONYM attribute is shown below. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | AT_NEXT_PSEU..| Length | Actual Pseudonym Length | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + . Next Pseudonym . + . . + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + The value field of this attribute begins with the 2-byte actual + pseudonym length, which specifies the length of the following + pseudonym in bytes. This field is followed by a pseudonym username + that the peer can use in the next authentication. The username MUST + NOT include any realm portion. The username does not include any + terminating null characters. Because the length of the attribute + must be a multiple of 4 bytes, the sender pads the pseudonym with + zero bytes when necessary. The username encoding MUST follow the + UTF-8 transformation format [RFC3629]. This attribute MUST always be + encrypted by encapsulating it within the AT_ENCR_DATA attribute. + +10.11. AT_NEXT_REAUTH_ID + + The format of the AT_NEXT_REAUTH_ID attribute is shown below. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | AT_NEXT_REAU..| Length | Actual Re-Auth Identity Length| + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + . Next Fast Re-authentication Username . + . . + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + The value field of this attribute begins with the 2-byte actual + re-authentication identity length which specifies the length of the + following fast re-authentication identity in bytes. This field is + followed by a fast re-authentication identity that the peer can use + in the next fast re-authentication, as described in Section 5. In + environments where a realm portion is required, the fast + re-authentication identity includes both a username portion and a + + + +Haverinen & Salowey Informational [Page 59] + +RFC 4186 EAP-SIM Authentication January 2006 + + + realm name portion. The fast re-authentication identity does not + include any terminating null characters. Because the length of the + attribute must be a multiple of 4 bytes, the sender pads the fast + re-authentication identity with zero bytes when necessary. The + identity encoding MUST follow the UTF-8 transformation format + [RFC3629]. This attribute MUST always be encrypted by encapsulating + it within the AT_ENCR_DATA attribute. + +10.12. AT_IV, AT_ENCR_DATA, and AT_PADDING + + AT_IV and AT_ENCR_DATA attributes can be used to transmit encrypted + information between the EAP-SIM peer and server. + + The value field of AT_IV contains two reserved bytes followed by a + 16-byte initialization vector required by the AT_ENCR_DATA attribute. + The reserved bytes are set to zero when sending and ignored on + reception. The AT_IV attribute MUST be included if and only if the + AT_ENCR_DATA is included. Section 6.3 specifies the operation if a + packet that does not meet this condition is encountered. + + The sender of the AT_IV attribute chooses the initialization vector + at random. The sender MUST NOT re-use the initialization vector + value from previous EAP-SIM packets. The sender SHOULD use a good + source of randomness to generate the initialization vector. Please + see [RFC4086] for more information about generating random numbers + for security applications. The format of AT_IV is shown below. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | AT_IV | Length = 5 | Reserved | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + | Initialization Vector | + | | + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + The value field of the AT_ENCR_DATA attribute consists of two + reserved bytes followed by cipher text bytes encrypted using the + Advanced Encryption Standard (AES) [AES] with a 128-bit key in the + Cipher Block Chaining (CBC) mode of operation using the + initialization vector from the AT_IV attribute. The reserved bytes + are set to zero when sending and ignored on reception. Please see + [CBC] for a description of the CBC mode. The format of the + AT_ENCR_DATA attribute is shown below. + + + + + +Haverinen & Salowey Informational [Page 60] + +RFC 4186 EAP-SIM Authentication January 2006 + + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | AT_ENCR_DATA | Length | Reserved | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + . Encrypted Data . + . . + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + The derivation of the encryption key (K_encr) is specified in Section + 7. + + The plaintext consists of nested EAP-SIM attributes. + + The encryption algorithm requires the length of the plaintext to be a + multiple of 16 bytes. The sender may need to include the AT_PADDING + attribute as the last attribute within AT_ENCR_DATA. The AT_PADDING + attribute is not included if the total length of other nested + attributes within the AT_ENCR_DATA attribute is a multiple of 16 + bytes. As usual, the Length of the Padding attribute includes the + Attribute Type and Attribute Length fields. The length of the + Padding attribute is 4, 8, or 12 bytes. It is chosen so that the + length of the value field of the AT_ENCR_DATA attribute becomes a + multiple of 16 bytes. The actual pad bytes in the value field are + set to zero (00 hexadecimal) on sending. The recipient of the + message MUST verify that the pad bytes are set to zero. If this + verification fails on the peer, then it MUST send the + EAP-Response/SIM/Client-Error packet with the error code "unable to + process packet" to terminate the authentication exchange. If this + verification fails on the server, then the server sends the peer the + EAP-Request/SIM/Notification packet with an AT_NOTIFICATION code that + implies failure to terminate the authentication exchange. The format + of the AT_PADDING attribute is shown below. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | AT_PADDING | Length | Padding... | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | + | | + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + + + + + + +Haverinen & Salowey Informational [Page 61] + +RFC 4186 EAP-SIM Authentication January 2006 + + +10.13. AT_RESULT_IND + + The format of the AT_RESULT_IND attribute is shown below. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | AT_RESULT_...| Length = 1 | Reserved | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + The value field of this attribute consists of two reserved bytes, + which are set to zero upon sending and ignored upon reception. This + attribute is always sent unencrypted, so it MUST NOT be encapsulated + within the AT_ENCR_DATA attribute. + +10.14. AT_MAC + + The AT_MAC attribute is used for EAP-SIM message authentication. + Section 8 specifies in which messages AT_MAC MUST be included. + + The value field of the AT_MAC attribute contains two reserved bytes + followed by a keyed message authentication code (MAC). The MAC is + calculated over the whole EAP packet and concatenated with optional + message-specific data, with the exception that the value field of the + MAC attribute is set to zero when calculating the MAC. The EAP + packet includes the EAP header that begins with the Code field, the + EAP-SIM header that begins with the Subtype field, and all the + attributes, as specified in Section 8.1. The reserved bytes in + AT_MAC are set to zero when sending and ignored on reception. The + contents of the message-specific data that may be included in the MAC + calculation are specified separately for each EAP-SIM message in + Section 9. + + The format of the AT_MAC attribute is shown below. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | AT_MAC | Length = 5 | Reserved | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + | MAC | + | | + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + + + + + +Haverinen & Salowey Informational [Page 62] + +RFC 4186 EAP-SIM Authentication January 2006 + + + The MAC algorithm is an HMAC-SHA1-128 [RFC2104] keyed hash value. + (The HMAC-SHA1-128 value is obtained from the 20-byte HMAC-SHA1 value + by truncating the output to the first 16 bytes. Hence, the length of + the MAC is 16 bytes. The derivation of the authentication key + (K_aut) used in the calculation of the MAC is specified in Section 7. + + When the AT_MAC attribute is included in an EAP-SIM message, the + recipient MUST process the AT_MAC attribute before looking at any + other attributes, except when processing EAP-Request/SIM/Challenge. + The processing of EAP-Request/SIM/Challenge is specified in Section + 9.3. If the message authentication code is invalid, then the + recipient MUST ignore all other attributes in the message and operate + as specified in Section 6.3. + +10.15. AT_COUNTER + + The format of the AT_COUNTER attribute is shown below. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | AT_COUNTER | Length = 1 | Counter | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + The value field of the AT_COUNTER attribute consists of a 16-bit + unsigned integer counter value, represented in network byte order. + This attribute MUST always be encrypted by encapsulating it within + the AT_ENCR_DATA attribute. + +10.16. AT_COUNTER_TOO_SMALL + + The format of the AT_COUNTER_TOO_SMALL attribute is shown below. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | AT_COUNTER...| Length = 1 | Reserved | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + The value field of this attribute consists of two reserved bytes, + which are set to zero upon sending and ignored upon reception. This + attribute MUST always be encrypted by encapsulating it within the + AT_ENCR_DATA attribute. + + + + + + + + +Haverinen & Salowey Informational [Page 63] + +RFC 4186 EAP-SIM Authentication January 2006 + + +10.17. AT_NONCE_S + + The format of the AT_NONCE_S attribute is shown below. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | AT_NONCE_S | Length = 5 | Reserved | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + | | + | NONCE_S | + | | + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + The value field of the AT_NONCE_S attribute contains two reserved + bytes followed by a random number freshly generated by the server (16 + bytes) for this EAP-SIM fast re-authentication. The random number is + used as a challenge for the peer and also as a seed value for the new + keying material. The reserved bytes are set to zero upon sending and + ignored upon reception. This attribute MUST always be encrypted by + encapsulating it within the AT_ENCR_DATA attribute. + + The server MUST NOT re-use the NONCE_S value from any previous + EAP-SIM fast re-authentication exchange. The server SHOULD use a + good source of randomness to generate NONCE_S. Please see [RFC4086] + for more information about generating random numbers for security + applications. + +10.18. AT_NOTIFICATION + + The format of the AT_NOTIFICATION attribute is shown below. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + |AT_NOTIFICATION| Length = 1 |S|P| Notification Code | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + The value field of this attribute contains a two-byte notification + code. The first and second bit (S and P) of the notification code + are interpreted as described in Section 6. + + The notification code values listed below have been reserved. The + descriptions below illustrate the semantics of the notifications. + + + + + +Haverinen & Salowey Informational [Page 64] + +RFC 4186 EAP-SIM Authentication January 2006 + + + The peer implementation MAY use different wordings when presenting + the notifications to the user. The "requested service" depends on + the environment where EAP-SIM is applied. + + 0 - General failure after authentication. (Implies failure, used + after successful authentication.) + + 16384 - General failure. (Implies failure, used before + authentication.) + + 32768 - Success. User has been successfully authenticated. (Does + not imply failure, used after successful authentication). The usage + of this code is discussed in Section 6.2. + + 1026 - User has been temporarily denied access to the requested + service. (Implies failure, used after successful authentication.) + + 1031 - User has not subscribed to the requested service. (Implies + failure, used after successful authentication.) + +10.19. AT_CLIENT_ERROR_CODE + + The format of the AT_CLIENT_ERROR_CODE attribute is shown below. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + |AT_CLIENT_ERR..| Length = 1 | Client Error Code | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + The value field of this attribute contains a two-byte client error + code. The following error code values have been reserved. + + + 0 "unable to process packet": a general error code + + 1 "unsupported version": the peer does not support any of + the versions listed in AT_VERSION_LIST + + 2 "insufficient number of challenges": the peer's policy + requires more triplets than the server included in AT_RAND + + 3 "RANDs are not fresh": the peer believes that the RAND + challenges included in AT_RAND were not fresh + + + + + + + +Haverinen & Salowey Informational [Page 65] + +RFC 4186 EAP-SIM Authentication January 2006 + + +11. IANA Considerations + + IANA has assigned the EAP type number 18 for this protocol. + + EAP-SIM shares most of the protocol design, such as attributes and + message Subtypes, with EAP-AKA [EAP-AKA]. EAP-SIM protocol numbers + should be administered in the same IANA registry as EAP-AKA. The + initial values are listed in [EAP-AKA] for both protocols, so this + document does not require any new registries or parameter allocation. + As a common registry is used for EAP-SIM and EAP-AKA, the protocol + number allocation policy for both protocols is specified in + [EAP-AKA]. + +12. Security Considerations + + The EAP specification [RFC3748] describes the security + vulnerabilities of EAP, which does not include its own security + mechanisms. This section discusses the claimed security properties + of EAP-SIM, as well as vulnerabilities and security recommendations. + +12.1. A3 and A8 Algorithms + + The GSM A3 and A8 algorithms are used in EAP-SIM. [GSM-03.20] + specifies the general GSM authentication procedure and the external + interface (inputs and outputs) of the A3 and A8 algorithms. The + operation of these functions falls completely within the domain of an + individual operator, and therefore, the functions are specified by + each operator rather than being fully standardised. The GSM-MILENAGE + algorithm, specified publicly in [3GPP-TS-55.205], is an example + algorithm set for A3 and A8 algorithms. + + The security of the A3 and A8 algorithms is important to the security + of EAP-SIM. Some A3/A8 algorithms have been compromised; see [GSM- + Cloning] for discussion about the security of COMP-128 version 1. + Note that several revised versions of the COMP-128 A3/A8 algorithm + have been devised after the publication of these weaknesses and that + the publicly specified GSM-MILENAGE algorithm is not vulnerable to + any known attacks. + +12.2. Identity Protection + + EAP-SIM includes optional identity privacy support that protects the + privacy of the subscriber identity against passive eavesdropping. + This document only specifies a mechanism to deliver pseudonyms from + the server to the peer as part of an EAP-SIM exchange. Hence, a peer + that has not yet performed any EAP-SIM exchanges does not typically + have a pseudonym available. If the peer does not have a pseudonym + available, then the privacy mechanism cannot be used, but the + + + +Haverinen & Salowey Informational [Page 66] + +RFC 4186 EAP-SIM Authentication January 2006 + + + permanent identity will have to be sent in the clear. The terminal + SHOULD store the pseudonym in a non-volatile memory so that it can be + maintained across reboots. An active attacker that impersonates the + network may use the AT_PERMANENT_ID_REQ attribute to attempt to learn + the subscriber's permanent identity. However, as discussed in + Section 4.2.2, the terminal can refuse to send the cleartext + permanent identity if it believes that the network should be able to + recognize the pseudonym. + + If the peer and server cannot guarantee that the pseudonym will be + maintained reliably, and identity privacy is required, then + additional protection from an external security mechanism (such as + Protected Extensible Authentication Protocol (PEAP) [PEAP]) may be + used. If an external security mechanism is in use, the identity + privacy features of EAP-SIM may not be useful. The security + considerations of using an external security mechanism with EAP-SIM + are beyond the scope of this document. + +12.3. Mutual Authentication and Triplet Exposure + + EAP-SIM provides mutual authentication. The peer believes that the + network is authentic because the network can calculate a correct + AT_MAC value in the EAP-Request/SIM/Challenge packet. To calculate + AT_MAC it is sufficient to know the RAND and Kc values from the GSM + triplets (RAND, SRES, Kc) used in the authentication. Because the + network selects the RAND challenges and the triplets, an attacker + that knows n (2 or 3) GSM triplets for the subscriber is able to + impersonate a valid network to the peer. (Some peers MAY employ an + implementation-specific counter-measure against impersonating a valid + network by re-using a previously used RAND; see below.) In other + words, the security of EAP-SIM is based on the secrecy of Kc keys, + which are considered secret intermediate results in the EAP-SIM + cryptographic calculations. + + Given physical access to the SIM card, it is easy to obtain any + number of GSM triplets. + + Another way to obtain triplets is to mount an attack on the peer + platform via a virus or other malicious piece of software. The peer + SHOULD be protected against triplet querying attacks by malicious + software. Care should be taken not to expose Kc keys to attackers + when they are stored or handled by the peer, or transmitted between + subsystems of the peer. Steps should be taken to limit the + transport, storage, and handling of these values outside a protected + environment within the peer. However, the virus protection of the + peer and the security capabilities of the peer's operating system are + outside the scope of this document. + + + + +Haverinen & Salowey Informational [Page 67] + +RFC 4186 EAP-SIM Authentication January 2006 + + + The EAP-SIM server typically obtains the triplets from the Home + Location Register (HLR). An attacker might try to obtain triplets by + attacking against the network used between the EAP-SIM server and the + HLR. Care should be taken not to expose Kc keys to attackers when + they are stored or handled by the EAP-SIM server, or transmitted + between the EAP server and the HLR. Steps should be taken to limit + the transport, storage, and handling of these values outside a + protected environment. However, the protection of the communications + between the EAP-SIM server and the HLR is outside the scope of this + document. + + If the same SIM credentials are also used for GSM traffic, the + triplets could be revealed in the GSM network; see Section 12.8. + + In GSM, the network is allowed to re-use the RAND challenge in + consecutive authentication exchanges. This is not allowed in + EAP-SIM. The EAP-SIM server is mandated to use fresh triplets (RAND + challenges) in consecutive authentication exchanges, as specified in + Section 3. EAP-SIM does not mandate any means for the peer to check + if the RANDs are fresh, so the security of the scheme leans on the + secrecy of the triplets. However, the peer MAY employ + implementation-specific mechanisms to remember some of the previously + used RANDs, and the peer MAY check the freshness of the server's + RANDs. The operation in cases when the peer detects that the RANDs + are not fresh is specified in Section 6.3.1. + + Preventing the re-use of authentication vectors has been taken into + account in the design of the UMTS Authentication and Key Agreement + (AKA), which is used in EAP-AKA [EAP-AKA]. In cases when the triplet + re-use properties of EAP-SIM are not considered sufficient, it is + advised to use EAP-AKA. + + Note that EAP-SIM mutual authentication is done with the EAP server. + In general, EAP methods do not authenticate the identity or services + provided by the EAP authenticator (if distinct from the EAP server) + unless they provide the so-called channel bindings property. The + vulnerabilities related to this have been discussed in [RFC3748], + [EAP-Keying], [Service-Identity]. + + EAP-SIM does not provide the channel bindings property, so it only + authenticates the EAP server. However, ongoing work such as + [Service-Identity] may provide such support as an extension to + popular EAP methods such as EAP-TLS, EAP-SIM, or EAP-AKA. + + + + + + + + +Haverinen & Salowey Informational [Page 68] + +RFC 4186 EAP-SIM Authentication January 2006 + + +12.4. Flooding the Authentication Centre + + The EAP-SIM server typically obtains authentication vectors from the + Authentication Centre (AuC). EAP-SIM introduces a new usage for the + AuC. The protocols between the EAP-SIM server and the AuC are out of + the scope of this document. However, it should be noted that a + malicious EAP-SIM peer may generate a lot of protocol requests to + mount a denial of service attack. The EAP-SIM server implementation + SHOULD take this into account and SHOULD take steps to limit the + traffic that it generates towards the AuC, preventing the attacker + from flooding the AuC and from extending the denial of service attack + from EAP-SIM to other users of the AuC. + +12.5. Key Derivation + + EAP-SIM supports key derivation. The key hierarchy is specified in + Section 7. EAP-SIM combines several GSM triplets in order to + generate stronger keying material and stronger AT_MAC values. The + actual strength of the resulting keys depends, among other things, on + operator-specific parameters including authentication algorithms, the + strength of the Ki key, and the quality of the RAND challenges. For + example, some SIM cards generate Kc keys with 10 bits set to zero. + Such restrictions may prevent the concatenation technique from + yielding strong session keys. Because the strength of the Ki key is + 128 bits, the ultimate strength of any derived secret key material is + never more than 128 bits. + + It should also be noted that a security policy that allows n=2 to be + used may compromise the security of a future policy that requires + three triplets, because adversaries may be able to exploit the + messages exchanged when the weaker policy is applied. + + There is no known way to obtain complete GSM triplets by mounting an + attack against EAP-SIM. A passive eavesdropper can learn n*RAND and + AT_MAC and may be able to link this information to the subscriber + identity. An active attacker that impersonates a GSM subscriber can + easily obtain n*RAND and AT_MAC values from the EAP server for any + given subscriber identity. However, calculating the Kc and SRES + values from AT_MAC would require the attacker to reverse the keyed + message authentication code function HMAC-SHA1-128. + + As EAP-SIM does not expose any values calculated from an individual + GSM Kc keys, it is not possible to mount a brute force attack on only + one of the Kc keys in EAP-SIM. Therefore, when considering brute + force attacks on the values exposed in EAP-SIM, the effective length + of EAP-SIM session keys is not compromised by the fact that they are + + + + + +Haverinen & Salowey Informational [Page 69] + +RFC 4186 EAP-SIM Authentication January 2006 + + + combined from several shorter keys, i.e., the effective length of 128 + bits may be achieved. For additional considerations, see Section + 12.8. + +12.6. Cryptographic Separation of Keys and Session Independence + + The EAP Transient Keys used to protect EAP-SIM packets (K_encr, + K_aut), the Master Session Key, and the Extended Master Session Key + are cryptographically separate in EAP-SIM. An attacker cannot derive + any non-trivial information about any of these keys based on the + other keys. An attacker also cannot calculate the pre-shared secret + (Ki) from the GSM Kc keys, from EAP-SIM K_encr, from EAP-SIM K_aut, + from the Master Session Key, or from the Extended Master Session Key. + + Each EAP-SIM exchange generates fresh keying material, and the keying + material exported from the method upon separate EAP-SIM exchanges is + cryptographically separate. The EAP-SIM peer contributes to the + keying material with the NONCE_MT parameter, which must be chosen + freshly for each full authentication exchange. The EAP server is + mandated to choose the RAND challenges freshly for each full + authentication exchange. If either the server or the peer chooses + its random value (NONCE_MT or RAND challenges) freshly, even if the + other entity re-used its value from a previous exchange, then the EAP + Transient Keys, the Master Session Key, and the Extended Master + Session Key will be different and cryptographically separate from the + corresponding values derived upon the previous full authentication + exchange. + + On fast re-authentication, freshness of the Master Session Key and + the Extended Master Session Key is provided with a counter + (AT_COUNTER). The same EAP Transient Keys (K_encr, K_aut) that were + used in the full authentication exchange are used to protect the EAP + negotiation. However, replay and integrity protection across all the + fast re-authentication exchanges that use the same EAP Transient Keys + is provided with AT_COUNTER. + + [RFC3748] defines session independence as the "demonstration that + passive attacks (such as capture of the EAP conversation) or active + attacks (including compromise of the MSK or EMSK) do not enable + compromise of subsequent or prior MSKs or EMSKs". Because the MSKs + and EMSKs are separate between EAP exchanges, EAP-SIM supports this + security claim. + + It should be noted that [Patel-2003], which predates [RFC3748], uses + a slightly different meaning for session independence. The EAP-SIM + protocol does not allow the peer to ensure that different Kc key + values would be used in different exchanges. Only the server is able + to ensure that fresh RANDs, and therefore, fresh Kc keys are used. + + + +Haverinen & Salowey Informational [Page 70] + +RFC 4186 EAP-SIM Authentication January 2006 + + + Hence, the peer cannot guarantee EAP-SIM sessions to be independent + with regard to the internal Kc values. However, in EAP-SIM, the Kc + keys are considered to be secret intermediate results, which are not + exported outside the method. See Section 12.3 for more information + about RAND re-use. + +12.7. Dictionary Attacks + + Because EAP-SIM is not a password protocol, it is not vulnerable to + dictionary attacks. (The pre-shared symmetric secret stored on the + SIM card is not a passphrase, nor is it derived from a passphrase.) + +12.8. Credentials Re-use + + EAP-SIM cannot prevent attacks over the GSM or GPRS radio networks. + If the same SIM credentials are also used in GSM or GPRS, it is + possible to mount attacks over the cellular interface. + + A passive attacker can eavesdrop GSM or GPRS traffic and obtain RAND, + SRES pairs. He can then use a brute force attack or other + cryptanalysis techniques to obtain the 64-bit Kc keys used to encrypt + the GSM or GPRS data. This makes it possible to attack each 64-bit + key separately. + + An active attacker can mount a "rogue GSM/GPRS base station attack", + replaying previously seen RAND challenges to obtain SRES values. He + can then use a brute force attack to obtain the Kc keys. If + successful, the attacker can impersonate a valid network or decrypt + previously seen traffic, because EAP-SIM does not provide perfect + forward secrecy (PFS). + + Due to several weaknesses in the GSM encryption algorithms, the + effective key strength of the Kc keys is much less than the expected + 64 bits (no more than 40 bits if the A5/1 GSM encryption algorithm is + used; as documented in [Barkan-2003], an active attacker can force + the peer to use the weaker A5/2 algorithm that can be broken in less + than a second). + + Because the A5 encryption algorithm is not used in EAP-SIM, and + because EAP-SIM does not expose any values calculated from individual + Kc keys, it should be noted that these attacks are not possible if + the SIM credentials used in EAP-SIM are not shared in GSM/GPRS. + + At the time this document was written, the 3rd Generation Partnership + Project (3GPP) has started to work on fixes to these A5 + vulnerabilities. One of the solution proposals discussed in 3GPP is + integrity-protected A5 version negotiation, which would require the + base station to prove knowledge of the Kc key before the terminal + + + +Haverinen & Salowey Informational [Page 71] + +RFC 4186 EAP-SIM Authentication January 2006 + + + sends any values calculated from the Kc to the network. Another + proposal is so-called special RANDs, where some bits of the RAND + challenge would be used for cryptographic separation by indicating + the allowed use of the triplet, such as the allowed A5 algorithm in + GSM or the fact that the triplet is intended for EAP-SIM. This is + currently a work in progress, and the mechanisms have not been + selected yet. + +12.9. Integrity and Replay Protection, and Confidentiality + + AT_MAC, AT_IV, AT_ENCR_DATA, and AT_COUNTER attributes are used to + provide integrity, replay and confidentiality protection for EAP-SIM + requests and responses. Integrity protection with AT_MAC includes + the EAP header. These attributes cannot be used during the + EAP/SIM/Start roundtrip. However, the protocol values (user identity + string, NONCE_MT, and version negotiation parameters) are + (implicitly) protected by later EAP-SIM messages by including them in + key derivation. + + Integrity protection (AT_MAC) is based on a keyed message + authentication code. Confidentiality (AT_ENCR_DATA and AT_IV) is + based on a block cipher. + + Confidentiality protection is applied only to a part of the protocol + fields. The table of attributes in Section 10.1 summarizes which + fields are confidentiality-protected. It should be noted that the + error and notification code attributes AT_CLIENT_ERROR_CODE and + AT_NOTIFICATION are not confidential, but they are transmitted in the + clear. Identity protection is discussed in Section 12.2. + + On full authentication, replay protection of the EAP exchange is + provided by the RAND values from the underlying GSM authentication + scheme and the use of the NONCE_MT value. Protection against replays + of EAP-SIM messages is also based on the fact that messages that can + include AT_MAC can only be sent once with a certain EAP-SIM Subtype, + and on the fact that a different K_aut key will be used for + calculating AT_MAC in each full authentication exchange. + + On fast re-authentication, a counter included in AT_COUNTER and a + server random nonce is used to provide replay protection. The + AT_COUNTER attribute is also included in EAP-SIM notifications if it + is used after successful authentication in order to provide replay + protection between re-authentication exchanges. + + Because EAP-SIM is not a tunneling method, EAP-Request/Notification, + EAP-Response/Notification, EAP-Success, or EAP-Failure packets are + not confidential, integrity-protected, or replay-protected in + EAP-SIM. On physically insecure networks, this may enable an + + + +Haverinen & Salowey Informational [Page 72] + +RFC 4186 EAP-SIM Authentication January 2006 + + + attacker to send false notifications to the peer and to mount denial + of service attacks by spoofing these packets. As discussed in + Section 6.3, the peer will only accept EAP-Success after the peer + successfully authenticates the server. Hence, the attacker cannot + force the peer to believe successful mutual authentication has + occurred until the peer successfully authenticates the server or + after the peer fails to authenticate the server. + + The security considerations of EAP-SIM result indications are covered + in Section 12.11 + + An eavesdropper will see the EAP-Request/Notification, + EAP-Response/Notification, EAP-Success, and EAP-Failure packets sent + in the clear. With EAP-SIM, confidential information MUST NOT be + transmitted in EAP Notification packets. + +12.10. Negotiation Attacks + + EAP-SIM does not protect the EAP-Response/Nak packet. Because + EAP-SIM does not protect the EAP method negotiation, EAP method + downgrading attacks may be possible, especially if the user uses the + same identity with EAP-SIM and other EAP methods. + + EAP-SIM includes a version negotiation procedure. In EAP-SIM the + keying material derivation includes the version list and selected + version to ensure that the protocol cannot be downgraded and that the + peer and server use the same version of EAP-SIM. + + EAP-SIM does not support ciphersuite negotiation. + +12.11. Protected Result Indications + + EAP-SIM supports optional protected success indications and + acknowledged failure indications. If a failure occurs after + successful authentication, then the EAP-SIM failure indication is + integrity- and replay-protected. + + Even if an EAP-Failure packet is lost when using EAP-SIM over an + unreliable medium, then the EAP-SIM failure indications will help + ensure that the peer and EAP server will know the other party's + authentication decision. If protected success indications are used, + then the loss of Success packet will also be addressed by the + acknowledged, integrity- and replay-protected EAP-SIM success + indication. If the optional success indications are not used, then + the peer may end up believing that the server succeeded + authentication, when it actually failed. Since access will not be + + + + + +Haverinen & Salowey Informational [Page 73] + +RFC 4186 EAP-SIM Authentication January 2006 + + + granted in this case, protected result indications are not needed + unless the client is not able to realize it does not have access for + an extended period of time. + +12.12. Man-in-the-Middle Attacks + + In order to avoid man-in-the-middle attacks and session hijacking, + user data SHOULD be integrity-protected on physically insecure + networks. The EAP-SIM Master Session Key, or keys derived from it, + MAY be used as the integrity protection keys, or, if an external + security mechanism such as PEAP is used, then the link integrity + protection keys MAY be derived by the external security mechanism. + + There are man-in-the-middle attacks associated with the use of any + EAP method within a tunneled protocol. For instance, an early + version of PEAP [PEAP-02] was vulnerable to this attack. This + specification does not address these attacks. If EAP-SIM is used + with a tunneling protocol, there should be cryptographic binding + provided between the protocol and EAP-SIM to prevent + man-in-the-middle attacks through rogue authenticators being able to + setup one-way authenticated tunnels. For example, newer versions of + PEAP include such cryptographic binding. The EAP-SIM Master Session + Key MAY be used to provide the cryptographic binding. However, the + mechanism by which the binding is provided depends on the tunneling + protocol and is beyond the scope of this document. + +12.13. Generating Random Numbers + + An EAP-SIM implementation SHOULD use a good source of randomness to + generate the random numbers required in the protocol. Please see + [RFC4086] for more information on generating random numbers for + security applications. + +13. Security Claims + + This section provides the security claims required by [RFC3748]. + + Auth. mechanism: EAP-SIM is based on the GSM SIM mechanism, which is + a challenge/response authentication and key agreement mechanism based + on a symmetric 128-bit pre-shared secret. EAP-SIM also makes use of + a peer challenge to provide mutual authentication. + + Ciphersuite negotiation: No + + Mutual authentication: Yes (Section 12.3) + + Integrity protection: Yes (Section 12.9) + + + + +Haverinen & Salowey Informational [Page 74] + +RFC 4186 EAP-SIM Authentication January 2006 + + + Replay protection: Yes (Section 12.9) + + Confidentiality: Yes, except method-specific success and failure + indications (Section 12.2, Section 12.9) + + Key derivation: Yes + + Key strength: EAP-SIM supports key derivation with 128-bit effective + key strength (Section 12.5). However, as discussed in Section 11, if + the same credentials are used in GSM/GPRS and in EAP-SIM, then the + key strength may be reduced considerably, basically to the same level + as in GSM, by mounting attacks over GSM/GPRS. For example an active + attack using a false GSM/GPRS base station reduces the effective key + strength to almost zero. + + Description of key hierarchy: Please see Section 7. + + Dictionary attack protection: N/A (Section 12.7) + + Fast reconnect: Yes + + Cryptographic binding: N/A + + Session independence: Yes (Section 12.6) + + Fragmentation: No + + Channel binding: No + + Indication of vulnerabilities: Vulnerabilities are discussed in + Section 12. + +14. Acknowledgements and Contributions + +14.1. Contributors + + In addition to the editors, Nora Dabbous, Jose Puthenkulam, and + Prasanna Satarasinghe were significant contributors to this document. + + Pasi Eronen and Jukka-Pekka Honkanen contributed Appendix A. + +14.2. Acknowledgements + + Juha Ala-Laurila, N. Asokan, Jan-Erik Ekberg, Patrik Flykt, + Jukka-Pekka Honkanen, Antti Kuikka, Jukka Latva, Lassi Lehtinen, Jyri + Rinnemaa, Timo Takamaki, and Raimo Vuonnala contributed many original + ideas and concepts to this protocol. + + + + +Haverinen & Salowey Informational [Page 75] + +RFC 4186 EAP-SIM Authentication January 2006 + + + N. Asokan, Pasi Eronen, and Jukka-Pekka Honkanen contributed and + helped in innumerable ways during the development of the protocol. + + Valtteri Niemi and Kaisa Nyberg contributed substantially to the + design of the key derivation and the fast re-authentication + procedure, and have also provided their cryptographic expertise in + many discussions related to this protocol. + + Simon Blake-Wilson provided very helpful comments on key derivation + and version negotiation. + + Thanks to Greg Rose for his very valuable comments to an early + version of this specification [S3-020125], and for reviewing and + providing very useful comments on version 12. + + Thanks to Bernard Aboba, Vladimir Alperovich, Florent Bersani, + Jacques Caron, Gopal Dommety, Augustin Farrugia, Mark Grayson, Max de + Groot, Prakash Iyer, Nishi Kant, Victor Lortz, Jouni Malinen, Sarvar + Patel, Tom Porcher, Michael Richardson, Stefan Schroeder, Uma + Shankar, Jesse Walker, and Thomas Wieland for their contributions and + critiques. Special thanks to Max for proposing improvements to the + MAC calculation. + + Thanks to Glen Zorn for reviewing this document and for providing + very useful comments on the protocol. + + Thanks to Sarvar Patel for his review of the protocol [Patel-2003]. + + Thanks to Bernard Aboba for reviewing this document for RFC 3748 + compliance. + + The identity privacy support is based on the identity privacy support + of [EAP-SRP]. The attribute format is based on the extension format + of Mobile IPv4 [RFC3344]. + + This protocol has been partly developed in parallel with EAP-AKA + [EAP-AKA], and hence this specification incorporates many ideas from + Jari Arkko. + + + + + + + + + + + + + +Haverinen & Salowey Informational [Page 76] + +RFC 4186 EAP-SIM Authentication January 2006 + + +14.2.1. Contributors' Addresses + + Nora Dabbous + Gemplus + 34 rue Guynemer + 92447 Issy les Moulineaux + France + + Phone: +33 1 4648 2000 + EMail: nora.dabbous@gemplus.com + + + Jose Puthenkulam + Intel Corporation + 2111 NE 25th Avenue, JF2-58 + Hillsboro, OR 97124 + USA + + Phone: +1 503 264 6121 + EMail: jose.p.puthenkulam@intel.com + + + Prasanna Satarasinghe + Transat Technologies + 180 State Street, Suite 240 + Southlake, TX 76092 + USA + + Phone: + 1 817 4814412 + EMail: prasannas@transat-tech.com + + + + + + + + + + + + + + + + + + + + + +Haverinen & Salowey Informational [Page 77] + +RFC 4186 EAP-SIM Authentication January 2006 + + +15. References + +15.1. Normative References + + [GSM-03.20] European Telecommunications Standards Institute, + "GSM Technical Specification GSM 03.20 (ETS 300 + 534): "Digital cellular telecommunication system + (Phase 2); Security related network functions"", + August 1997. + + [RFC2119] Bradner, S., "Key words for use in RFCs to + Indicate Requirement Levels", BCP 14, RFC 2119, + March 1997. + + [GSM-03.03] European Telecommunications Standards Institute, + "GSM Technical Specification GSM 03.03 (ETS 300 + 523): "Digital cellular telecommunication system + (Phase 2); Numbering, addressing and + identification"", April 1997. + + [RFC2104] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: + Keyed-Hashing for Message Authentication", RFC + 2104, February 1997. + + [RFC4282] Aboba, B., Beadles, M., Arkko, J., and P. Eronen, + "The Network Access Identifier", RFC 4282, + December 2005. + + [AES] National Institute of Standards and Technology, + "Federal Information Processing Standards (FIPS) + Publication 197, "Advanced Encryption Standard + (AES)"", November 2001. + http://csrc.nist.gov/publications/fips/fips197/ + fips-197.pdf + + [CBC] National Institute of Standards and Technology, + "NIST Special Publication 800-38A, "Recommendation + for Block Cipher Modes of Operation - Methods and + Techniques"", December 2001. + http://csrc.nist.gov/publications/nistpubs/ + 800-38a/sp800-38a.pdf + + [SHA-1] National Institute of Standards and Technology, + U.S. Department of Commerce, "Federal Information + Processing Standard (FIPS) Publication 180-1, + "Secure Hash Standard"", April 1995. + + + + + +Haverinen & Salowey Informational [Page 78] + +RFC 4186 EAP-SIM Authentication January 2006 + + + [PRF] National Institute of Standards and Technology, + "Federal Information Processing Standards (FIPS) + Publication 186-2 (with change notice); Digital + Signature Standard (DSS)", January 2000. + Available on-line at: + http://csrc.nist.gov/publications/ + fips/fips186-2/fips186-2-change1.pdf + + [RFC3629] Yergeau, F., "UTF-8, a transformation format of + ISO 10646", STD 63, RFC 3629, November 2003. + + [RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., + and H. Levkowetz, "Extensible Authentication + Protocol (EAP)", RFC 3748, June 2004. + + [EAP-AKA] Arkko, J. and H. Haverinen, "Extensible + Authentication Protocol Method for 3rd Generation + Authentication and Key Agreement (EAP-AKA)", RFC + 4187, January 2006. + +15.2. Informative References + + [3GPP-TS-23.003] 3rd Generation Partnership Project, "3GPP + Technical Specification 3GPP TS 23.003 V6.8.0: + "3rd Generation Parnership Project; Technical + Specification Group Core Network; Numbering, + addressing and identification (Release 6)"", + December 2005. + + [3GPP-TS-55.205] 3rd Generation Partnership Project, "3GPP + Technical Specification 3GPP TS 55.205 V 6.0.0: + "3rd Generation Partnership Project; Technical + Specification Group Services and System Aspects; + Specification of the GSM-MILENAGE Algorithms: An + example algorithm set for the GSM Authentication + and Key Generation functions A3 and A8 (Release + 6)"", December 2002. + + [PEAP] Palekar, A., Simon, D., Zorn, G., Salowey, J., + Zhou, H., and S. Josefsson, "Protected EAP + Protocol (PEAP) Version 2", Work in Progress, + October 2004. + + [PEAP-02] Anderson, H., Josefsson, S., Zorn, G., Simon, D., + and A. Palekar, "Protected EAP Protocol (PEAP)", + Work in Progress, February 2002. + + + + + +Haverinen & Salowey Informational [Page 79] + +RFC 4186 EAP-SIM Authentication January 2006 + + + [EAP-Keying] Aboba, B., Simon, D., Arkko, J., Eronen, P., and + H. Levkowetz, "Extensible Authentication Protocol + (EAP) Key Management Framework", Work in Progress, + October 2005. + + [Service-Identity] Arkko, J. and P. Eronen, "Authenticated Service + Information for the Extensible Authentication + Protocol (EAP)", Work in Progress, October 2004. + + [RFC4086] Eastlake, D., 3rd, Schiller, J., and S. Crocker, + "Randomness Requirements for Security", BCP 106, + RFC 4086, June 2005. + + [S3-020125] Qualcomm, "Comments on draft EAP/SIM, 3rd + Generation Partnership Project document 3GPP TSG + SA WG3 Security S3#22, S3-020125", February 2002. + + [RFC3344] Perkins, C., "IP Mobility Support for IPv4", RFC + 3344, August 2002. + + [RFC2548] Zorn, G., "Microsoft Vendor-specific RADIUS + Attributes ", RFC 2548, March 1999. + + [EAP-SRP] Carlson, J., Aboba, B., and H. Haverinen, "EAP + SRP-SHA1 Authentication Protocol", Work in + Progress, July 2001. + + [GSM-Cloning] Wagner, D., "GSM Cloning". Web page about + COMP-128 version 1 vulnerabilities, available at + http://www.isaac.cs.berkeley.edu/isaac/gsm.html + + [Barkan-2003] Barkan, E., Biham, E., and N. Keller, "Instant + Ciphertext-Only Cryptanalysis of GSM Encrypted + Communications". available on-line at + http://cryptome.org/gsm-crack-bbk.pdf + + [Patel-2003] Patel, S., "Analysis of EAP-SIM Session Key + Agreement". Posted to the EAP mailing list 29 + May,2003. http:// + mail.frascone.com/pipermail/public/eap/2003-May/ + 001267.html + + + + + + + + + + +Haverinen & Salowey Informational [Page 80] + +RFC 4186 EAP-SIM Authentication January 2006 + + +Appendix A. Test Vectors + + Test vectors for the NIST FIPS 186-2 pseudo-random number generator + [PRF] are available at the following URL: + http://csrc.nist.gov/encryption/dss/Examples-1024bit.pdf + + The following examples show the contents of EAP-SIM packets on full + authentication and fast re-authentication. + +A.1. EAP-Request/Identity + + The first packet is a plain Identity Request: + + 01 ; Code: Request + 00 ; Identifier: 0 + 00 05 ; Length: 5 octets + 01 ; Type: Identity + +A.2. EAP-Response/Identity + + The client's identity is "1244070100000001@eapsim.foo", so it + responds with the following packet: + + 02 ; Code: Response + 00 ; Identifier: 0 + 00 20 ; Length: 32 octets + 01 ; Type: Identity + 31 32 34 34 ; "1244070100000001@eapsim.foo" + 30 37 30 31 + 30 30 30 30 + 30 30 30 31 + 40 65 61 70 + 73 69 6d 2e + 66 6f 6f + + + + + + + + + + + + + + + + + +Haverinen & Salowey Informational [Page 81] + +RFC 4186 EAP-SIM Authentication January 2006 + + +A.3. EAP-Request/SIM/Start + + The server's first packet looks like this: + + 01 ; Code: Request + 01 ; Identifier: 1 + 00 10 ; Length: 16 octets + 12 ; Type: EAP-SIM + 0a ; EAP-SIM subtype: Start + 00 00 ; (reserved) + 0f ; Attribute type: AT_VERSION_LIST + 02 ; Attribute length: 8 octets (2*4) + 00 02 ; Actual version list length: 2 octets + 00 01 ; Version: 1 + 00 00 ; (attribute padding) + +A.4. EAP-Response/SIM/Start + + The client selects a nonce and responds with the following packet: + + 02 ; Code: Response + 01 ; Identifier: 1 + 00 20 ; Length: 32 octets + 12 ; Type: EAP-SIM + 0a ; EAP-SIM subtype: Start + 00 00 ; (reserved) + 07 ; Attribute type: AT_NONCE_MT + 05 ; Attribute length: 20 octets (5*4) + 00 00 ; (reserved) + 01 23 45 67 ; NONCE_MT value + 89 ab cd ef + fe dc ba 98 + 76 54 32 10 + 10 ; Attribute type: AT_SELECTED_VERSION + 01 ; Attribute length: 4 octets (1*4) + 00 01 ; Version: 1 + + + + + + + + + + + + + + + +Haverinen & Salowey Informational [Page 82] + +RFC 4186 EAP-SIM Authentication January 2006 + + +A.5. EAP-Request/SIM/Challenge + + Next, the server selects three authentication triplets + + (RAND1,SRES1,Kc1) = (10111213 14151617 18191a1b 1c1d1e1f, + d1d2d3d4, + a0a1a2a3 a4a5a6a7) + (RAND2,SRES2,Kc2) = (20212223 24252627 28292a2b 2c2d2e2f, + e1e2e3e4, + b0b1b2b3 b4b5b6b7) + (RAND3,SRES3,Kc3) = (30313233 34353637 38393a3b 3c3d3e3f, + f1f2f3f4, + c0c1c2c3 c4c5c6c7) + + Next, the MK is calculated as specified in Section 7*. + + MK = e576d5ca 332e9930 018bf1ba ee2763c7 95b3c712 + + And the other keys are derived using the PRNG: + + K_encr = 536e5ebc 4465582a a6a8ec99 86ebb620 + K_aut = 25af1942 efcbf4bc 72b39434 21f2a974 + MSK = 39d45aea f4e30601 983e972b 6cfd46d1 + c3637733 65690d09 cd44976b 525f47d3 + a60a985e 955c53b0 90b2e4b7 3719196a + 40254296 8fd14a88 8f46b9a7 886e4488 + EMSK = 5949eab0 fff69d52 315c6c63 4fd14a7f + 0d52023d 56f79698 fa6596ab eed4f93f + bb48eb53 4d985414 ceed0d9a 8ed33c38 + 7c9dfdab 92ffbdf2 40fcecf6 5a2c93b9 + + Next, the server selects a pseudonym and a fast re-authentication + identity (in this case, "w8w49PexCazWJ&xCIARmxuMKht5S1sxR + DqXSEFBEg3DcZP9cIxTe5J4OyIwNGVzxeJOU1G" and + "Y24fNSrz8BP274jOJaF17WfxI8YO7QX0 + 0pMXk9XMMVOw7broaNhTczuFq53aEpOkk3L0dm@eapsim.foo", respectively). + + + + + + + + + + + + + + + +Haverinen & Salowey Informational [Page 83] + +RFC 4186 EAP-SIM Authentication January 2006 + + + The following plaintext will be encrypted and stored in the + AT_ENCR_DATA attribute: + + 84 ; Attribute type: AT_NEXT_PSEUDONYM + 13 ; Attribute length: 76 octets (19*4) + 00 46 ; Actual pseudonym length: 70 octets + 77 38 77 34 39 50 65 78 43 61 7a 57 4a 26 78 43 + 49 41 52 6d 78 75 4d 4b 68 74 35 53 31 73 78 52 + 44 71 58 53 45 46 42 45 67 33 44 63 5a 50 39 63 + 49 78 54 65 35 4a 34 4f 79 49 77 4e 47 56 7a 78 + 65 4a 4f 55 31 47 + 00 00 ; (attribute padding) + 85 ; Attribute type: AT_NEXT_REAUTH_ID + 16 ; Attribute length: 88 octets (22*4) + 00 51 ; Actual re-auth identity length: 81 octets + 59 32 34 66 4e 53 72 7a 38 42 50 32 37 34 6a 4f + 4a 61 46 31 37 57 66 78 49 38 59 4f 37 51 58 30 + 30 70 4d 58 6b 39 58 4d 4d 56 4f 77 37 62 72 6f + 61 4e 68 54 63 7a 75 46 71 35 33 61 45 70 4f 6b + 6b 33 4c 30 64 6d 40 65 61 70 73 69 6d 2e 66 6f + 6f + 00 00 00 ; (attribute padding) + 06 ; Attribute type: AT_PADDING + 03 ; Attribute length: 12 octets (3*4) + 00 00 00 00 + 00 00 00 00 + 00 00 + + The EAP packet looks like this: + + 01 ; Code: Request + 02 ; Identifier: 2 + 01 18 ; Length: 280 octets + 12 ; Type: EAP-SIM + 0b ; EAP-SIM subtype: Challenge + 00 00 ; (reserved) + 01 ; Attribute type: AT_RAND + 0d ; Attribute length: 52 octets (13*4) + 00 00 ; (reserved) + 10 11 12 13 ; first RAND + 14 15 16 17 + 18 19 1a 1b + 1c 1d 1e 1f + 20 21 22 23 ; second RAND + 24 25 26 27 + 28 29 2a 2b + 2c 2d 2e 2f + + + + +Haverinen & Salowey Informational [Page 84] + +RFC 4186 EAP-SIM Authentication January 2006 + + + 30 31 32 33 ; third RAND + 34 35 36 37 + 38 39 3a 3b + 3c 3d 3e 3f + 81 ; Attribute type: AT_IV + 05 ; Attribute length: 20 octets (5*4) + 00 00 ; (reserved) + 9e 18 b0 c2 ; IV value + 9a 65 22 63 + c0 6e fb 54 + dd 00 a8 95 + 82 ; Attribute type: AT_ENCR_DATA + 2d ; Attribute length: 180 octets (45*4) + 00 00 ; (reserved) + 55 f2 93 9b bd b1 b1 9e a1 b4 7f c0 b3 e0 be 4c + ab 2c f7 37 2d 98 e3 02 3c 6b b9 24 15 72 3d 58 + ba d6 6c e0 84 e1 01 b6 0f 53 58 35 4b d4 21 82 + 78 ae a7 bf 2c ba ce 33 10 6a ed dc 62 5b 0c 1d + 5a a6 7a 41 73 9a e5 b5 79 50 97 3f c7 ff 83 01 + 07 3c 6f 95 31 50 fc 30 3e a1 52 d1 e1 0a 2d 1f + 4f 52 26 da a1 ee 90 05 47 22 52 bd b3 b7 1d 6f + 0c 3a 34 90 31 6c 46 92 98 71 bd 45 cd fd bc a6 + 11 2f 07 f8 be 71 79 90 d2 5f 6d d7 f2 b7 b3 20 + bf 4d 5a 99 2e 88 03 31 d7 29 94 5a ec 75 ae 5d + 43 c8 ed a5 fe 62 33 fc ac 49 4e e6 7a 0d 50 4d + 0b ; Attribute type: AT_MAC + 05 ; Attribute length: 20 octets (5*4) + 00 00 ; (reserved) + fe f3 24 ac ; MAC value + 39 62 b5 9f + 3b d7 82 53 + ae 4d cb 6a + + The MAC is calculated over the EAP packet above (with MAC value set + to zero), followed by the NONCE_MT value (a total of 296 bytes). + + + + + + + + + + + + + + + + +Haverinen & Salowey Informational [Page 85] + +RFC 4186 EAP-SIM Authentication January 2006 + + +A.6. EAP-Response/SIM/Challenge + + The client's response looks like this: + + 02 ; Code: Response + 02 ; Identifier: 2 + 00 1c ; Length: 28 octets + 12 ; Type: EAP-SIM + 0b ; EAP-SIM subtype: Challenge + 00 00 ; (reserved) + 0b ; Attribute type: AT_MAC + 05 ; Attribute length: 20 octets (5*4) + 00 00 ; (reserved) + f5 6d 64 33 ; MAC value + e6 8e d2 97 + 6a c1 19 37 + fc 3d 11 54 + + The MAC is calculated over the EAP packet above (with MAC value set + to zero), followed by the SRES values (a total of 40 bytes). + +A.7. EAP-Success + + The last packet is an EAP-Success: + + 03 ; Code: Success + 02 ; Identifier: 2 + 00 04 ; Length: 4 octets + +A.8. Fast Re-authentication + + When performing fast re-authentication, the EAP-Request/Identity + packet is the same as usual. The EAP-Response/Identity contains the + fast re-authentication identity (from AT_ENCR_DATA attribute above): + + 02 ; Code: Response + 00 ; Identifier: 0 + 00 56 ; Length: 86 octets + 01 ; Type: Identity + 59 32 34 66 4e 53 72 7a 38 42 50 32 37 34 6a 4f + 4a 61 46 31 37 57 66 78 49 38 59 4f 37 51 58 30 + 30 70 4d 58 6b 39 58 4d 4d 56 4f 77 37 62 72 6f + 61 4e 68 54 63 7a 75 46 71 35 33 61 45 70 4f 6b + 6b 33 4c 30 64 6d 40 65 61 70 73 69 6d 2e 66 6f + 6f + + + + + + +Haverinen & Salowey Informational [Page 86] + +RFC 4186 EAP-SIM Authentication January 2006 + + +A.9. EAP-Request/SIM/Re-authentication + + The server recognizes the reauthentication identity, so it will + respond with EAP-Request/SIM/Re-authentication. It retrieves the + associated counter value, generates a nonce, and picks a new + reauthentication identity (in this case, + "uta0M0iyIsMwWp5TTdSdnOLvg2XDVf21OYt1vnfiMcs5dnIDHOIFVavIRzMR + yzW6vFzdHW@eapsim.foo"). + + The following plaintext will be encrypted and stored in the + AT_ENCR_DATA attribute. Note that AT_PADDING is not used because the + length of the plaintext is a multiple of 16 bytes. + + 13 ; Attribute type: AT_COUNTER + 01 ; Attribute length: 4 octets (1*4) + 00 01 ; Counter value + 15 ; Attribute type: AT_NONCE_S + 05 ; Attribute length: 20 octets (5*4) + 00 00 ; (reserved) + 01 23 45 67 ; NONCE_S value + 89 ab cd ef + fe dc ba 98 + 76 54 32 10 + 85 ; Attribute type: AT_NEXT_REAUTH_ID + 16 ; Attribute length: 88 octets (22*4) + 00 51 ; Actual re-auth identity length: 81 octets + 75 74 61 30 4d 30 69 79 49 73 4d 77 57 70 35 54 + 54 64 53 64 6e 4f 4c 76 67 32 58 44 56 66 32 31 + 4f 59 74 31 76 6e 66 69 4d 63 73 35 64 6e 49 44 + 48 4f 49 46 56 61 76 49 52 7a 4d 52 79 7a 57 36 + 76 46 7a 64 48 57 40 65 61 70 73 69 6d 2e 66 6f + 6f + 00 00 00 ; (attribute padding) + + + + + + + + + + + + + + + + + + +Haverinen & Salowey Informational [Page 87] + +RFC 4186 EAP-SIM Authentication January 2006 + + + The EAP packet looks like this: + + 01 ; Code: Request + 01 ; Identifier: 1 + 00 a4 ; Length: 164 octets + 12 ; Type: EAP-SIM + 0d ; EAP-SIM subtype: Re-authentication + 00 00 ; (reserved) + 81 ; Attribute type: AT_IV + 05 ; Attribute length: 20 octets (5*4) + 00 00 ; (reserved) + d5 85 ac 77 ; IV value + 86 b9 03 36 + 65 7c 77 b4 + 65 75 b9 c4 + 82 ; Attribute type: AT_ENCR_DATA + 1d ; Attribute length: 116 octets (29*4) + 00 00 ; (reserved) + 68 62 91 a9 d2 ab c5 8c aa 32 94 b6 e8 5b 44 84 + 6c 44 e5 dc b2 de 8b 9e 80 d6 9d 49 85 8a 5d b8 + 4c dc 1c 9b c9 5c 01 b9 6b 6e ca 31 34 74 ae a6 + d3 14 16 e1 9d aa 9d f7 0f 05 00 88 41 ca 80 14 + 96 4d 3b 30 a4 9b cf 43 e4 d3 f1 8e 86 29 5a 4a + 2b 38 d9 6c 97 05 c2 bb b0 5c 4a ac e9 7d 5e af + f5 64 04 6c 8b d3 0b c3 9b e5 e1 7a ce 2b 10 a6 + 0b ; Attribute type: AT_MAC + 05 ; Attribute length: 20 octets (5*4) + 00 00 ; (reserved) + 48 3a 17 99 ; MAC value + b8 3d 7c d3 + d0 a1 e4 01 + d9 ee 47 70 + + The MAC is calculated over the EAP packet above (with MAC value set + to zero; a total of 164 bytes). + + Finally, the server derives new keys. The XKEY' is calculated as + described in Section 7*: + + XKEY' = 863dc120 32e08343 c1a2308d b48377f6 801f58d4 + + + + + + + + + + + +Haverinen & Salowey Informational [Page 88] + +RFC 4186 EAP-SIM Authentication January 2006 + + + The new MSK and EMSK are derived using the PRNG (note that K_encr and + K_aut stay the same). + + MSK = 6263f614 973895e1 335f7e30 cff028ee + 2176f519 002c9abe 732fe0ef 00cf167c + 756d9e4c ed6d5ed6 40eb3fe3 8565ca07 + 6e7fb8a8 17cfe8d9 adbce441 d47c4f5e + EMSK = 3d8ff786 3a630b2b 06e2cf20 9684c13f + 6b82f992 f2b06f1b 54bf51ef 237f2a40 + 1ef5e0d7 e098a34c 533eaebf 34578854 + b7721526 20a777f0 e0340884 a294fb73 + +A.10. EAP-Response/SIM/Re-authentication + + The client's response includes the counter as well. The following + plaintext will be encrypted and stored in the AT_ENCR_DATA attribute: + + 13 ; Attribute type: AT_COUNTER + 01 ; Attribute length: 4 octets (1*4) + 00 01 ; Counter value + 06 ; Attribute type: AT_PADDING + 03 ; Attribute length: 12 octets (3*4) + 00 00 00 00 + 00 00 00 00 + 00 00 + + The EAP packet looks like this: + + 02 ; Code: Response + 01 ; Identifier: 1 + 00 44 ; Length: 68 octets + 12 ; Type: EAP-SIM + 0d ; EAP-SIM subtype: Re-authentication + 00 00 ; (reserved) + 81 ; Attribute type: AT_IV + 05 ; Attribute length: 20 octets (5*4) + 00 00 ; (reserved) + cd f7 ff a6 ; IV value + 5d e0 4c 02 + 6b 56 c8 6b + 76 b1 02 ea + 82 ; Attribute type: AT_ENCR_DATA + 05 ; Attribute length: 20 octets (5*4) + 00 00 ; (reserved) + b6 ed d3 82 + 79 e2 a1 42 + 3c 1a fc 5c + 45 5c 7d 56 + + + +Haverinen & Salowey Informational [Page 89] + +RFC 4186 EAP-SIM Authentication January 2006 + + + 0b ; Attribute type: AT_MAC + 05 ; Attribute length: 20 octets (5*4) + 00 00 ; (reserved) + fa f7 6b 71 ; MAC value + fb e2 d2 55 + b9 6a 35 66 + c9 15 c6 17 + + The MAC is calculated over the EAP packet above (with MAC value set + to zero), followed by the NONCE_S value (a total of 84 bytes). + + The next packet will be EAP-Success: + + 03 ; Code: Success + 01 ; Identifier: 1 + 00 04 ; Length: 4 octets + +Appendix B. Pseudo-Random Number Generator + + The "|" character denotes concatenation, and "^" denotes + exponentiation. + + Step 1: Choose a new, secret value for the seed-key, XKEY + + Step 2: In hexadecimal notation let + t = 67452301 EFCDAB89 98BADCFE 10325476 C3D2E1F0 + This is the initial value for H0|H1|H2|H3|H4 + in the FIPS SHS [SHA-1] + + Step 3: For j = 0 to m - 1 do + 3.1 XSEED_j = 0 /* no optional user input */ + 3.2 For i = 0 to 1 do + a. XVAL = (XKEY + XSEED_j) mod 2^b + b. w_i = G(t, XVAL) + c. XKEY = (1 + XKEY + w_i) mod 2^b + 3.3 x_j = w_0|w_1 + + + + + + + + + + + + + + + +Haverinen & Salowey Informational [Page 90] + +RFC 4186 EAP-SIM Authentication January 2006 + + +Authors' Addresses + + Henry Haverinen (editor) + Nokia Enterprise Solutions + P.O. Box 12 + FIN-40101 Jyvaskyla + Finland + + EMail: henry.haverinen@nokia.com + + + Joseph Salowey (editor) + Cisco Systems + 2901 Third Avenue + Seattle, WA 98121 + USA + + Phone: +1 206 256 3380 + EMail: jsalowey@cisco.com + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Haverinen & Salowey Informational [Page 91] + +RFC 4186 EAP-SIM Authentication January 2006 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2006). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at + ietf-ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is provided by the IETF + Administrative Support Activity (IASA). + + + + + + + +Haverinen & Salowey Informational [Page 92] + diff --git a/doc/standards/rfc4301.txt b/doc/standards/rfc4301.txt new file mode 100644 index 000000000..4a8eba975 --- /dev/null +++ b/doc/standards/rfc4301.txt @@ -0,0 +1,5659 @@ + + + + + + +Network Working Group S. Kent +Request for Comments: 4301 K. Seo +Obsoletes: 2401 BBN Technologies +Category: Standards Track December 2005 + + + Security Architecture for the Internet Protocol + +Status of This Memo + + This document specifies an Internet standards track protocol for the + Internet community, and requests discussion and suggestions for + improvements. Please refer to the current edition of the "Internet + Official Protocol Standards" (STD 1) for the standardization state + and status of this protocol. Distribution of this memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2005). + +Abstract + + This document describes an updated version of the "Security + Architecture for IP", which is designed to provide security services + for traffic at the IP layer. This document obsoletes RFC 2401 + (November 1998). + +Dedication + + This document is dedicated to the memory of Charlie Lynn, a long-time + senior colleague at BBN, who made very significant contributions to + the IPsec documents. + + + + + + + + + + + + + + + + + + + +Kent & Seo Standards Track [Page 1] + +RFC 4301 Security Architecture for IP December 2005 + + +Table of Contents + + 1. Introduction ....................................................4 + 1.1. Summary of Contents of Document ............................4 + 1.2. Audience ...................................................4 + 1.3. Related Documents ..........................................5 + 2. Design Objectives ...............................................5 + 2.1. Goals/Objectives/Requirements/Problem Description ..........5 + 2.2. Caveats and Assumptions ....................................6 + 3. System Overview .................................................7 + 3.1. What IPsec Does ............................................7 + 3.2. How IPsec Works ............................................9 + 3.3. Where IPsec Can Be Implemented ............................10 + 4. Security Associations ..........................................11 + 4.1. Definition and Scope ......................................12 + 4.2. SA Functionality ..........................................16 + 4.3. Combining SAs .............................................17 + 4.4. Major IPsec Databases .....................................18 + 4.4.1. The Security Policy Database (SPD) .................19 + 4.4.1.1. Selectors .................................26 + 4.4.1.2. Structure of an SPD Entry .................30 + 4.4.1.3. More Regarding Fields Associated + with Next Layer Protocols .................32 + 4.4.2. Security Association Database (SAD) ................34 + 4.4.2.1. Data Items in the SAD .....................36 + 4.4.2.2. Relationship between SPD, PFP + flag, packet, and SAD .....................38 + 4.4.3. Peer Authorization Database (PAD) ..................43 + 4.4.3.1. PAD Entry IDs and Matching Rules ..........44 + 4.4.3.2. IKE Peer Authentication Data ..............45 + 4.4.3.3. Child SA Authorization Data ...............46 + 4.4.3.4. How the PAD Is Used .......................46 + 4.5. SA and Key Management .....................................47 + 4.5.1. Manual Techniques ..................................48 + 4.5.2. Automated SA and Key Management ....................48 + 4.5.3. Locating a Security Gateway ........................49 + 4.6. SAs and Multicast .........................................50 + 5. IP Traffic Processing ..........................................50 + 5.1. Outbound IP Traffic Processing + (protected-to-unprotected) ................................52 + 5.1.1. Handling an Outbound Packet That Must Be + Discarded ..........................................54 + 5.1.2. Header Construction for Tunnel Mode ................55 + 5.1.2.1. IPv4: Header Construction for + Tunnel Mode ...............................57 + 5.1.2.2. IPv6: Header Construction for + Tunnel Mode ...............................59 + 5.2. Processing Inbound IP Traffic (unprotected-to-protected) ..59 + + + +Kent & Seo Standards Track [Page 2] + +RFC 4301 Security Architecture for IP December 2005 + + + 6. ICMP Processing ................................................63 + 6.1. Processing ICMP Error Messages Directed to an + IPsec Implementation ......................................63 + 6.1.1. ICMP Error Messages Received on the + Unprotected Side of the Boundary ...................63 + 6.1.2. ICMP Error Messages Received on the + Protected Side of the Boundary .....................64 + 6.2. Processing Protected, Transit ICMP Error Messages .........64 + 7. Handling Fragments (on the protected side of the IPsec + boundary) ......................................................66 + 7.1. Tunnel Mode SAs that Carry Initial and Non-Initial + Fragments .................................................67 + 7.2. Separate Tunnel Mode SAs for Non-Initial Fragments ........67 + 7.3. Stateful Fragment Checking ................................68 + 7.4. BYPASS/DISCARD Traffic ....................................69 + 8. Path MTU/DF Processing .........................................69 + 8.1. DF Bit ....................................................69 + 8.2. Path MTU (PMTU) Discovery .................................70 + 8.2.1. Propagation of PMTU ................................70 + 8.2.2. PMTU Aging .........................................71 + 9. Auditing .......................................................71 + 10. Conformance Requirements ......................................71 + 11. Security Considerations .......................................72 + 12. IANA Considerations ...........................................72 + 13. Differences from RFC 2401 .....................................72 + 14. Acknowledgements ..............................................75 + Appendix A: Glossary ..............................................76 + Appendix B: Decorrelation .........................................79 + B.1. Decorrelation Algorithm ...................................79 + Appendix C: ASN.1 for an SPD Entry ................................82 + Appendix D: Fragment Handling Rationale ...........................88 + D.1. Transport Mode and Fragments ..............................88 + D.2. Tunnel Mode and Fragments .................................89 + D.3. The Problem of Non-Initial Fragments ......................90 + D.4. BYPASS/DISCARD Traffic ....................................93 + D.5. Just say no to ports? .....................................94 + D.6. Other Suggested Solutions..................................94 + D.7. Consistency................................................95 + D.8. Conclusions................................................95 + Appendix E: Example of Supporting Nested SAs via SPD and + Forwarding Table Entries...............................96 + References.........................................................98 + Normative References............................................98 + Informative References..........................................99 + + + + + + + +Kent & Seo Standards Track [Page 3] + +RFC 4301 Security Architecture for IP December 2005 + + +1. Introduction + +1.1. Summary of Contents of Document + + This document specifies the base architecture for IPsec-compliant + systems. It describes how to provide a set of security services for + traffic at the IP layer, in both the IPv4 [Pos81a] and IPv6 [DH98] + environments. This document describes the requirements for systems + that implement IPsec, the fundamental elements of such systems, and + how the elements fit together and fit into the IP environment. It + also describes the security services offered by the IPsec protocols, + and how these services can be employed in the IP environment. This + document does not address all aspects of the IPsec architecture. + Other documents address additional architectural details in + specialized environments, e.g., use of IPsec in Network Address + Translation (NAT) environments and more comprehensive support for IP + multicast. The fundamental components of the IPsec security + architecture are discussed in terms of their underlying, required + functionality. Additional RFCs (see Section 1.3 for pointers to + other documents) define the protocols in (a), (c), and (d). + + a. Security Protocols -- Authentication Header (AH) and + Encapsulating Security Payload (ESP) + b. Security Associations -- what they are and how they work, + how they are managed, associated processing + c. Key Management -- manual and automated (The Internet Key + Exchange (IKE)) + d. Cryptographic algorithms for authentication and encryption + + This document is not a Security Architecture for the Internet; it + addresses security only at the IP layer, provided through the use of + a combination of cryptographic and protocol security mechanisms. + + The spelling "IPsec" is preferred and used throughout this and all + related IPsec standards. All other capitalizations of IPsec (e.g., + IPSEC, IPSec, ipsec) are deprecated. However, any capitalization of + the sequence of letters "IPsec" should be understood to refer to the + IPsec protocols. + + The keywords MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD, + SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL, when they appear in this + document, are to be interpreted as described in RFC 2119 [Bra97]. + +1.2. Audience + + The target audience for this document is primarily individuals who + implement this IP security technology or who architect systems that + will use this technology. Technically adept users of this technology + + + +Kent & Seo Standards Track [Page 4] + +RFC 4301 Security Architecture for IP December 2005 + + + (end users or system administrators) also are part of the target + audience. A glossary is provided in Appendix A to help fill in gaps + in background/vocabulary. This document assumes that the reader is + familiar with the Internet Protocol (IP), related networking + technology, and general information system security terms and + concepts. + +1.3. Related Documents + + As mentioned above, other documents provide detailed definitions of + some of the components of IPsec and of their interrelationship. They + include RFCs on the following topics: + + a. security protocols -- RFCs describing the Authentication + Header (AH) [Ken05b] and Encapsulating Security Payload + (ESP) [Ken05a] protocols. + b. cryptographic algorithms for integrity and encryption -- one + RFC that defines the mandatory, default algorithms for use + with AH and ESP [Eas05], a similar RFC that defines the + mandatory algorithms for use with IKEv2 [Sch05] plus a + separate RFC for each cryptographic algorithm. + c. automatic key management -- RFCs on "The Internet Key + Exchange (IKEv2) Protocol" [Kau05] and "Cryptographic + Algorithms for Use in the Internet Key Exchange Version 2 + (IKEv2)" [Sch05]. + +2. Design Objectives + +2.1. Goals/Objectives/Requirements/Problem Description + + IPsec is designed to provide interoperable, high quality, + cryptographically-based security for IPv4 and IPv6. The set of + security services offered includes access control, connectionless + integrity, data origin authentication, detection and rejection of + replays (a form of partial sequence integrity), confidentiality (via + encryption), and limited traffic flow confidentiality. These + services are provided at the IP layer, offering protection in a + standard fashion for all protocols that may be carried over IP + (including IP itself). + + IPsec includes a specification for minimal firewall functionality, + since that is an essential aspect of access control at the IP layer. + Implementations are free to provide more sophisticated firewall + mechanisms, and to implement the IPsec-mandated functionality using + those more sophisticated mechanisms. (Note that interoperability may + suffer if additional firewall constraints on traffic flows are + imposed by an IPsec implementation but cannot be negotiated based on + the traffic selector features defined in this document and negotiated + + + +Kent & Seo Standards Track [Page 5] + +RFC 4301 Security Architecture for IP December 2005 + + + via IKEv2.) The IPsec firewall function makes use of the + cryptographically-enforced authentication and integrity provided for + all IPsec traffic to offer better access control than could be + obtained through use of a firewall (one not privy to IPsec internal + parameters) plus separate cryptographic protection. + + Most of the security services are provided through use of two traffic + security protocols, the Authentication Header (AH) and the + Encapsulating Security Payload (ESP), and through the use of + cryptographic key management procedures and protocols. The set of + IPsec protocols employed in a context, and the ways in which they are + employed, will be determined by the users/administrators in that + context. It is the goal of the IPsec architecture to ensure that + compliant implementations include the services and management + interfaces needed to meet the security requirements of a broad user + population. + + When IPsec is correctly implemented and deployed, it ought not + adversely affect users, hosts, and other Internet components that do + not employ IPsec for traffic protection. IPsec security protocols + (AH and ESP, and to a lesser extent, IKE) are designed to be + cryptographic algorithm independent. This modularity permits + selection of different sets of cryptographic algorithms as + appropriate, without affecting the other parts of the implementation. + For example, different user communities may select different sets of + cryptographic algorithms (creating cryptographically-enforced + cliques) if required. + + To facilitate interoperability in the global Internet, a set of + default cryptographic algorithms for use with AH and ESP is specified + in [Eas05] and a set of mandatory-to-implement algorithms for IKEv2 + is specified in [Sch05]. [Eas05] and [Sch05] will be periodically + updated to keep pace with computational and cryptologic advances. By + specifying these algorithms in documents that are separate from the + AH, ESP, and IKEv2 specifications, these algorithms can be updated or + replaced without affecting the standardization progress of the rest + of the IPsec document suite. The use of these cryptographic + algorithms, in conjunction with IPsec traffic protection and key + management protocols, is intended to permit system and application + developers to deploy high quality, Internet-layer, cryptographic + security technology. + +2.2. Caveats and Assumptions + + The suite of IPsec protocols and associated default cryptographic + algorithms are designed to provide high quality security for Internet + traffic. However, the security offered by use of these protocols + ultimately depends on the quality of their implementation, which is + + + +Kent & Seo Standards Track [Page 6] + +RFC 4301 Security Architecture for IP December 2005 + + + outside the scope of this set of standards. Moreover, the security + of a computer system or network is a function of many factors, + including personnel, physical, procedural, compromising emanations, + and computer security practices. Thus, IPsec is only one part of an + overall system security architecture. + + Finally, the security afforded by the use of IPsec is critically + dependent on many aspects of the operating environment in which the + IPsec implementation executes. For example, defects in OS security, + poor quality of random number sources, sloppy system management + protocols and practices, etc., can all degrade the security provided + by IPsec. As above, none of these environmental attributes are + within the scope of this or other IPsec standards. + +3. System Overview + + This section provides a high level description of how IPsec works, + the components of the system, and how they fit together to provide + the security services noted above. The goal of this description is + to enable the reader to "picture" the overall process/system, see how + it fits into the IP environment, and to provide context for later + sections of this document, which describe each of the components in + more detail. + + An IPsec implementation operates in a host, as a security gateway + (SG), or as an independent device, affording protection to IP + traffic. (A security gateway is an intermediate system implementing + IPsec, e.g., a firewall or router that has been IPsec-enabled.) More + detail on these classes of implementations is provided later, in + Section 3.3. The protection offered by IPsec is based on requirements + defined by a Security Policy Database (SPD) established and + maintained by a user or system administrator, or by an application + operating within constraints established by either of the above. In + general, packets are selected for one of three processing actions + based on IP and next layer header information ("Selectors", Section + 4.4.1.1) matched against entries in the SPD. Each packet is either + PROTECTed using IPsec security services, DISCARDed, or allowed to + BYPASS IPsec protection, based on the applicable SPD policies + identified by the Selectors. + +3.1. What IPsec Does + + IPsec creates a boundary between unprotected and protected + interfaces, for a host or a network (see Figure 1 below). Traffic + traversing the boundary is subject to the access controls specified + by the user or administrator responsible for the IPsec configuration. + These controls indicate whether packets cross the boundary unimpeded, + are afforded security services via AH or ESP, or are discarded. + + + +Kent & Seo Standards Track [Page 7] + +RFC 4301 Security Architecture for IP December 2005 + + + IPsec security services are offered at the IP layer through selection + of appropriate security protocols, cryptographic algorithms, and + cryptographic keys. IPsec can be used to protect one or more "paths" + (a) between a pair of hosts, (b) between a pair of security gateways, + or (c) between a security gateway and a host. A compliant host + implementation MUST support (a) and (c) and a compliant security + gateway must support all three of these forms of connectivity, since + under certain circumstances a security gateway acts as a host. + + Unprotected + ^ ^ + | | + +-------------|-------|-------+ + | +-------+ | | | + | |Discard|<--| V | + | +-------+ |B +--------+ | + ................|y..| AH/ESP |..... IPsec Boundary + | +---+ |p +--------+ | + | |IKE|<----|a ^ | + | +---+ |s | | + | +-------+ |s | | + | |Discard|<--| | | + | +-------+ | | | + +-------------|-------|-------+ + | | + V V + Protected + + Figure 1. Top Level IPsec Processing Model + + In this diagram, "unprotected" refers to an interface that might also + be described as "black" or "ciphertext". Here, "protected" refers to + an interface that might also be described as "red" or "plaintext". + The protected interface noted above may be internal, e.g., in a host + implementation of IPsec, the protected interface may link to a socket + layer interface presented by the OS. In this document, the term + "inbound" refers to traffic entering an IPsec implementation via the + unprotected interface or emitted by the implementation on the + unprotected side of the boundary and directed towards the protected + interface. The term "outbound" refers to traffic entering the + implementation via the protected interface, or emitted by the + implementation on the protected side of the boundary and directed + toward the unprotected interface. An IPsec implementation may + support more than one interface on either or both sides of the + boundary. + + + + + + +Kent & Seo Standards Track [Page 8] + +RFC 4301 Security Architecture for IP December 2005 + + + Note the facilities for discarding traffic on either side of the + IPsec boundary, the BYPASS facility that allows traffic to transit + the boundary without cryptographic protection, and the reference to + IKE as a protected-side key and security management function. + + IPsec optionally supports negotiation of IP compression [SMPT01], + motivated in part by the observation that when encryption is employed + within IPsec, it prevents effective compression by lower protocol + layers. + +3.2. How IPsec Works + + IPsec uses two protocols to provide traffic security services -- + Authentication Header (AH) and Encapsulating Security Payload (ESP). + Both protocols are described in detail in their respective RFCs + [Ken05b, Ken05a]. IPsec implementations MUST support ESP and MAY + support AH. (Support for AH has been downgraded to MAY because + experience has shown that there are very few contexts in which ESP + cannot provide the requisite security services. Note that ESP can be + used to provide only integrity, without confidentiality, making it + comparable to AH in most contexts.) + + o The IP Authentication Header (AH) [Ken05b] offers integrity and + data origin authentication, with optional (at the discretion of + the receiver) anti-replay features. + + o The Encapsulating Security Payload (ESP) protocol [Ken05a] offers + the same set of services, and also offers confidentiality. Use of + ESP to provide confidentiality without integrity is NOT + RECOMMENDED. When ESP is used with confidentiality enabled, there + are provisions for limited traffic flow confidentiality, i.e., + provisions for concealing packet length, and for facilitating + efficient generation and discard of dummy packets. This + capability is likely to be effective primarily in virtual private + network (VPN) and overlay network contexts. + + o Both AH and ESP offer access control, enforced through the + distribution of cryptographic keys and the management of traffic + flows as dictated by the Security Policy Database (SPD, Section + 4.4.1). + + These protocols may be applied individually or in combination with + each other to provide IPv4 and IPv6 security services. However, most + security requirements can be met through the use of ESP by itself. + Each protocol supports two modes of use: transport mode and tunnel + mode. In transport mode, AH and ESP provide protection primarily for + + + + + +Kent & Seo Standards Track [Page 9] + +RFC 4301 Security Architecture for IP December 2005 + + + next layer protocols; in tunnel mode, AH and ESP are applied to + tunneled IP packets. The differences between the two modes are + discussed in Section 4.1. + + IPsec allows the user (or system administrator) to control the + granularity at which a security service is offered. For example, one + can create a single encrypted tunnel to carry all the traffic between + two security gateways, or a separate encrypted tunnel can be created + for each TCP connection between each pair of hosts communicating + across these gateways. IPsec, through the SPD management paradigm, + incorporates facilities for specifying: + + o which security protocol (AH or ESP) to employ, the mode (transport + or tunnel), security service options, what cryptographic + algorithms to use, and in what combinations to use the specified + protocols and services, and + + o the granularity at which protection should be applied. + + Because most of the security services provided by IPsec require the + use of cryptographic keys, IPsec relies on a separate set of + mechanisms for putting these keys in place. This document requires + support for both manual and automated distribution of keys. It + specifies a specific public-key based approach (IKEv2 [Kau05]) for + automated key management, but other automated key distribution + techniques MAY be used. + + Note: This document mandates support for several features for which + support is available in IKEv2 but not in IKEv1, e.g., negotiation of + an SA representing ranges of local and remote ports or negotiation of + multiple SAs with the same selectors. Therefore, this document + assumes use of IKEv2 or a key and security association management + system with comparable features. + +3.3. Where IPsec Can Be Implemented + + There are many ways in which IPsec may be implemented in a host, or + in conjunction with a router or firewall to create a security + gateway, or as an independent security device. + + a. IPsec may be integrated into the native IP stack. This requires + access to the IP source code and is applicable to both hosts and + security gateways, although native host implementations benefit + the most from this strategy, as explained later (Section 4.4.1, + paragraph 6; Section 4.4.1.1, last paragraph). + + + + + + +Kent & Seo Standards Track [Page 10] + +RFC 4301 Security Architecture for IP December 2005 + + + b. In a "bump-in-the-stack" (BITS) implementation, IPsec is + implemented "underneath" an existing implementation of an IP + protocol stack, between the native IP and the local network + drivers. Source code access for the IP stack is not required in + this context, making this implementation approach appropriate for + use with legacy systems. This approach, when it is adopted, is + usually employed in hosts. + + c. The use of a dedicated, inline security protocol processor is a + common design feature of systems used by the military, and of some + commercial systems as well. It is sometimes referred to as a + "bump-in-the-wire" (BITW) implementation. Such implementations + may be designed to serve either a host or a gateway. Usually, the + BITW device is itself IP addressable. When supporting a single + host, it may be quite analogous to a BITS implementation, but in + supporting a router or firewall, it must operate like a security + gateway. + + This document often talks in terms of use of IPsec by a host or a + security gateway, without regard to whether the implementation is + native, BITS, or BITW. When the distinctions among these + implementation options are significant, the document makes reference + to specific implementation approaches. + + A host implementation of IPsec may appear in devices that might not + be viewed as "hosts". For example, a router might employ IPsec to + protect routing protocols (e.g., BGP) and management functions (e.g., + Telnet), without affecting subscriber traffic traversing the router. + A security gateway might employ separate IPsec implementations to + protect its management traffic and subscriber traffic. The + architecture described in this document is very flexible. For + example, a computer with a full-featured, compliant, native OS IPsec + implementation should be capable of being configured to protect + resident (host) applications and to provide security gateway + protection for traffic traversing the computer. Such configuration + would make use of the forwarding tables and the SPD selection + function described in Sections 5.1 and 5.2. + +4. Security Associations + + This section defines Security Association management requirements for + all IPv6 implementations and for those IPv4 implementations that + implement AH, ESP, or both AH and ESP. The concept of a "Security + Association" (SA) is fundamental to IPsec. Both AH and ESP make use + of SAs, and a major function of IKE is the establishment and + maintenance of SAs. All implementations of AH or ESP MUST support + the concept of an SA as described below. The remainder of this + + + + +Kent & Seo Standards Track [Page 11] + +RFC 4301 Security Architecture for IP December 2005 + + + section describes various aspects of SA management, defining required + characteristics for SA policy management and SA management + techniques. + +4.1. Definition and Scope + + An SA is a simplex "connection" that affords security services to the + traffic carried by it. Security services are afforded to an SA by + the use of AH, or ESP, but not both. If both AH and ESP protection + are applied to a traffic stream, then two SAs must be created and + coordinated to effect protection through iterated application of the + security protocols. To secure typical, bi-directional communication + between two IPsec-enabled systems, a pair of SAs (one in each + direction) is required. IKE explicitly creates SA pairs in + recognition of this common usage requirement. + + For an SA used to carry unicast traffic, the Security Parameters + Index (SPI) by itself suffices to specify an SA. (For information on + the SPI, see Appendix A and the AH and ESP specifications [Ken05b, + Ken05a].) However, as a local matter, an implementation may choose + to use the SPI in conjunction with the IPsec protocol type (AH or + ESP) for SA identification. If an IPsec implementation supports + multicast, then it MUST support multicast SAs using the algorithm + below for mapping inbound IPsec datagrams to SAs. Implementations + that support only unicast traffic need not implement this de- + multiplexing algorithm. + + In many secure multicast architectures, e.g., [RFC3740], a central + Group Controller/Key Server unilaterally assigns the Group Security + Association's (GSA's) SPI. This SPI assignment is not negotiated or + coordinated with the key management (e.g., IKE) subsystems that + reside in the individual end systems that constitute the group. + Consequently, it is possible that a GSA and a unicast SA can + simultaneously use the same SPI. A multicast-capable IPsec + implementation MUST correctly de-multiplex inbound traffic even in + the context of SPI collisions. + + Each entry in the SA Database (SAD) (Section 4.4.2) must indicate + whether the SA lookup makes use of the destination IP address, or the + destination and source IP addresses, in addition to the SPI. For + multicast SAs, the protocol field is not employed for SA lookups. + For each inbound, IPsec-protected packet, an implementation must + conduct its search of the SAD such that it finds the entry that + matches the "longest" SA identifier. In this context, if two or more + SAD entries match based on the SPI value, then the entry that also + matches based on destination address, or destination and source + address (as indicated in the SAD entry) is the "longest" match. This + implies a logical ordering of the SAD search as follows: + + + +Kent & Seo Standards Track [Page 12] + +RFC 4301 Security Architecture for IP December 2005 + + + 1. Search the SAD for a match on the combination of SPI, + destination address, and source address. If an SAD entry + matches, then process the inbound packet with that + matching SAD entry. Otherwise, proceed to step 2. + + 2. Search the SAD for a match on both SPI and destination address. + If the SAD entry matches, then process the inbound packet + with that matching SAD entry. Otherwise, proceed to step 3. + + 3. Search the SAD for a match on only SPI if the receiver has + chosen to maintain a single SPI space for AH and ESP, and on + both SPI and protocol, otherwise. If an SAD entry matches, + then process the inbound packet with that matching SAD entry. + Otherwise, discard the packet and log an auditable event. + + In practice, an implementation may choose any method (or none at all) + to accelerate this search, although its externally visible behavior + MUST be functionally equivalent to having searched the SAD in the + above order. For example, a software-based implementation could + index into a hash table by the SPI. The SAD entries in each hash + table bucket's linked list could be kept sorted to have those SAD + entries with the longest SA identifiers first in that linked list. + Those SAD entries having the shortest SA identifiers could be sorted + so that they are the last entries in the linked list. A + hardware-based implementation may be able to effect the longest match + search intrinsically, using commonly available Ternary + Content-Addressable Memory (TCAM) features. + + The indication of whether source and destination address matching is + required to map inbound IPsec traffic to SAs MUST be set either as a + side effect of manual SA configuration or via negotiation using an SA + management protocol, e.g., IKE or Group Domain of Interpretation + (GDOI) [RFC3547]. Typically, Source-Specific Multicast (SSM) [HC03] + groups use a 3-tuple SA identifier composed of an SPI, a destination + multicast address, and source address. An Any-Source Multicast group + SA requires only an SPI and a destination multicast address as an + identifier. + + If different classes of traffic (distinguished by Differentiated + Services Code Point (DSCP) bits [NiBlBaBL98], [Gro02]) are sent on + the same SA, and if the receiver is employing the optional + anti-replay feature available in both AH and ESP, this could result + in inappropriate discarding of lower priority packets due to the + windowing mechanism used by this feature. Therefore, a sender SHOULD + put traffic of different classes, but with the same selector values, + on different SAs to support Quality of Service (QoS) appropriately. + To permit this, the IPsec implementation MUST permit establishment + and maintenance of multiple SAs between a given sender and receiver, + + + +Kent & Seo Standards Track [Page 13] + +RFC 4301 Security Architecture for IP December 2005 + + + with the same selectors. Distribution of traffic among these + parallel SAs to support QoS is locally determined by the sender and + is not negotiated by IKE. The receiver MUST process the packets from + the different SAs without prejudice. These requirements apply to + both transport and tunnel mode SAs. In the case of tunnel mode SAs, + the DSCP values in question appear in the inner IP header. In + transport mode, the DSCP value might change en route, but this should + not cause problems with respect to IPsec processing since the value + is not employed for SA selection and MUST NOT be checked as part of + SA/packet validation. However, if significant re-ordering of packets + occurs in an SA, e.g., as a result of changes to DSCP values en + route, this may trigger packet discarding by a receiver due to + application of the anti-replay mechanism. + + DISCUSSION: Although the DSCP [NiBlBaBL98, Gro02] and Explicit + Congestion Notification (ECN) [RaFlBl01] fields are not "selectors", + as that term in used in this architecture, the sender will need a + mechanism to direct packets with a given (set of) DSCP values to the + appropriate SA. This mechanism might be termed a "classifier". + + As noted above, two types of SAs are defined: transport mode and + tunnel mode. IKE creates pairs of SAs, so for simplicity, we choose + to require that both SAs in a pair be of the same mode, transport or + tunnel. + + A transport mode SA is an SA typically employed between a pair of + hosts to provide end-to-end security services. When security is + desired between two intermediate systems along a path (vs. end-to-end + use of IPsec), transport mode MAY be used between security gateways + or between a security gateway and a host. In the case where + transport mode is used between security gateways or between a + security gateway and a host, transport mode may be used to support + in-IP tunneling (e.g., IP-in-IP [Per96] or Generic Routing + Encapsulation (GRE) tunneling [FaLiHaMeTr00] or dynamic routing + [ToEgWa04]) over transport mode SAs. To clarify, the use of + transport mode by an intermediate system (e.g., a security gateway) + is permitted only when applied to packets whose source address (for + outbound packets) or destination address (for inbound packets) is an + address belonging to the intermediate system itself. The access + control functions that are an important part of IPsec are + significantly limited in this context, as they cannot be applied to + the end-to-end headers of the packets that traverse a transport mode + SA used in this fashion. Thus, this way of using transport mode + should be evaluated carefully before being employed in a specific + context. + + + + + + +Kent & Seo Standards Track [Page 14] + +RFC 4301 Security Architecture for IP December 2005 + + + In IPv4, a transport mode security protocol header appears + immediately after the IP header and any options, and before any next + layer protocols (e.g., TCP or UDP). In IPv6, the security protocol + header appears after the base IP header and selected extension + headers, but may appear before or after destination options; it MUST + appear before next layer protocols (e.g., TCP, UDP, Stream Control + Transmission Protocol (SCTP)). In the case of ESP, a transport mode + SA provides security services only for these next layer protocols, + not for the IP header or any extension headers preceding the ESP + header. In the case of AH, the protection is also extended to + selected portions of the IP header preceding it, selected portions of + extension headers, and selected options (contained in the IPv4 + header, IPv6 Hop-by-Hop extension header, or IPv6 Destination + extension headers). For more details on the coverage afforded by AH, + see the AH specification [Ken05b]. + + A tunnel mode SA is essentially an SA applied to an IP tunnel, with + the access controls applied to the headers of the traffic inside the + tunnel. Two hosts MAY establish a tunnel mode SA between themselves. + Aside from the two exceptions below, whenever either end of a + security association is a security gateway, the SA MUST be tunnel + mode. Thus, an SA between two security gateways is typically a + tunnel mode SA, as is an SA between a host and a security gateway. + The two exceptions are as follows. + + o Where traffic is destined for a security gateway, e.g., Simple + Network Management Protocol (SNMP) commands, the security gateway + is acting as a host and transport mode is allowed. In this case, + the SA terminates at a host (management) function within a + security gateway and thus merits different treatment. + + o As noted above, security gateways MAY support a transport mode SA + to provide security for IP traffic between two intermediate + systems along a path, e.g., between a host and a security gateway + or between two security gateways. + + Several concerns motivate the use of tunnel mode for an SA involving + a security gateway. For example, if there are multiple paths (e.g., + via different security gateways) to the same destination behind a + security gateway, it is important that an IPsec packet be sent to the + security gateway with which the SA was negotiated. Similarly, a + packet that might be fragmented en route must have all the fragments + delivered to the same IPsec instance for reassembly prior to + cryptographic processing. Also, when a fragment is processed by + IPsec and transmitted, then fragmented en route, it is critical that + there be inner and outer headers to retain the fragmentation state + data for the pre- and post-IPsec packet formats. Hence there are + several reasons for employing tunnel mode when either end of an SA is + + + +Kent & Seo Standards Track [Page 15] + +RFC 4301 Security Architecture for IP December 2005 + + + a security gateway. (Use of an IP-in-IP tunnel in conjunction with + transport mode can also address these fragmentation issues. However, + this configuration limits the ability of IPsec to enforce access + control policies on traffic.) + + Note: AH and ESP cannot be applied using transport mode to IPv4 + packets that are fragments. Only tunnel mode can be employed in such + cases. For IPv6, it would be feasible to carry a plaintext fragment + on a transport mode SA; however, for simplicity, this restriction + also applies to IPv6 packets. See Section 7 for more details on + handling plaintext fragments on the protected side of the IPsec + barrier. + + For a tunnel mode SA, there is an "outer" IP header that specifies + the IPsec processing source and destination, plus an "inner" IP + header that specifies the (apparently) ultimate source and + destination for the packet. The security protocol header appears + after the outer IP header, and before the inner IP header. If AH is + employed in tunnel mode, portions of the outer IP header are afforded + protection (as above), as well as all of the tunneled IP packet + (i.e., all of the inner IP header is protected, as well as next layer + protocols). If ESP is employed, the protection is afforded only to + the tunneled packet, not to the outer header. + + In summary, + + a) A host implementation of IPsec MUST support both transport and + tunnel mode. This is true for native, BITS, and BITW + implementations for hosts. + + b) A security gateway MUST support tunnel mode and MAY support + transport mode. If it supports transport mode, that should be + used only when the security gateway is acting as a host, e.g., for + network management, or to provide security between two + intermediate systems along a path. + +4.2. SA Functionality + + The set of security services offered by an SA depends on the security + protocol selected, the SA mode, the endpoints of the SA, and the + election of optional services within the protocol. + + For example, both AH and ESP offer integrity and authentication + services, but the coverage differs for each protocol and differs for + transport vs. tunnel mode. If the integrity of an IPv4 option or + IPv6 extension header must be protected en route between sender and + receiver, AH can provide this service, except for IP or extension + headers that may change in a fashion not predictable by the sender. + + + +Kent & Seo Standards Track [Page 16] + +RFC 4301 Security Architecture for IP December 2005 + + + However, the same security may be achieved in some contexts by + applying ESP to a tunnel carrying a packet. + + The granularity of access control provided is determined by the + choice of the selectors that define each SA. Moreover, the + authentication means employed by IPsec peers, e.g., during creation + of an IKE (vs. child) SA also affects the granularity of the access + control afforded. + + If confidentiality is selected, then an ESP (tunnel mode) SA between + two security gateways can offer partial traffic flow confidentiality. + The use of tunnel mode allows the inner IP headers to be encrypted, + concealing the identities of the (ultimate) traffic source and + destination. Moreover, ESP payload padding also can be invoked to + hide the size of the packets, further concealing the external + characteristics of the traffic. Similar traffic flow confidentiality + services may be offered when a mobile user is assigned a dynamic IP + address in a dialup context, and establishes a (tunnel mode) ESP SA + to a corporate firewall (acting as a security gateway). Note that + fine-granularity SAs generally are more vulnerable to traffic + analysis than coarse-granularity ones that are carrying traffic from + many subscribers. + + Note: A compliant implementation MUST NOT allow instantiation of an + ESP SA that employs both NULL encryption and no integrity algorithm. + An attempt to negotiate such an SA is an auditable event by both + initiator and responder. The audit log entry for this event SHOULD + include the current date/time, local IKE IP address, and remote IKE + IP address. The initiator SHOULD record the relevant SPD entry. + +4.3. Combining SAs + + This document does not require support for nested security + associations or for what RFC 2401 [RFC2401] called "SA bundles". + These features still can be effected by appropriate configuration of + both the SPD and the local forwarding functions (for inbound and + outbound traffic), but this capability is outside of the IPsec module + and thus the scope of this specification. As a result, management of + nested/bundled SAs is potentially more complex and less assured than + under the model implied by RFC 2401 [RFC2401]. An implementation + that provides support for nested SAs SHOULD provide a management + interface that enables a user or administrator to express the nesting + requirement, and then create the appropriate SPD entries and + forwarding table entries to effect the requisite processing. (See + Appendix E for an example of how to configure nested SAs.) + + + + + + +Kent & Seo Standards Track [Page 17] + +RFC 4301 Security Architecture for IP December 2005 + + +4.4. Major IPsec Databases + + Many of the details associated with processing IP traffic in an IPsec + implementation are largely a local matter, not subject to + standardization. However, some external aspects of the processing + must be standardized to ensure interoperability and to provide a + minimum management capability that is essential for productive use of + IPsec. This section describes a general model for processing IP + traffic relative to IPsec functionality, in support of these + interoperability and functionality goals. The model described below + is nominal; implementations need not match details of this model as + presented, but the external behavior of implementations MUST + correspond to the externally observable characteristics of this model + in order to be compliant. + + There are three nominal databases in this model: the Security Policy + Database (SPD), the Security Association Database (SAD), and the Peer + Authorization Database (PAD). The first specifies the policies that + determine the disposition of all IP traffic inbound or outbound from + a host or security gateway (Section 4.4.1). The second database + contains parameters that are associated with each established (keyed) + SA (Section 4.4.2). The third database, the PAD, provides a link + between an SA management protocol (such as IKE) and the SPD (Section + 4.4.3). + + Multiple Separate IPsec Contexts + + If an IPsec implementation acts as a security gateway for multiple + subscribers, it MAY implement multiple separate IPsec contexts. + Each context MAY have and MAY use completely independent + identities, policies, key management SAs, and/or IPsec SAs. This + is for the most part a local implementation matter. However, a + means for associating inbound (SA) proposals with local contexts + is required. To this end, if supported by the key management + protocol in use, context identifiers MAY be conveyed from + initiator to responder in the signaling messages, with the result + that IPsec SAs are created with a binding to a particular context. + For example, a security gateway that provides VPN service to + multiple customers will be able to associate each customer's + traffic with the correct VPN. + + Forwarding vs Security Decisions + + The IPsec model described here embodies a clear separation between + forwarding (routing) and security decisions, to accommodate a wide + range of contexts where IPsec may be employed. Forwarding may be + trivial, in the case where there are only two interfaces, or it + may be complex, e.g., if the context in which IPsec is implemented + + + +Kent & Seo Standards Track [Page 18] + +RFC 4301 Security Architecture for IP December 2005 + + + employs a sophisticated forwarding function. IPsec assumes only + that outbound and inbound traffic that has passed through IPsec + processing is forwarded in a fashion consistent with the context + in which IPsec is implemented. Support for nested SAs is + optional; if required, it requires coordination between forwarding + tables and SPD entries to cause a packet to traverse the IPsec + boundary more than once. + + "Local" vs "Remote" + + In this document, with respect to IP addresses and ports, the + terms "Local" and "Remote" are used for policy rules. "Local" + refers to the entity being protected by an IPsec implementation, + i.e., the "source" address/port of outbound packets or the + "destination" address/port of inbound packets. "Remote" refers to + a peer entity or peer entities. The terms "source" and + "destination" are used for packet header fields. + + "Non-initial" vs "Initial" Fragments + + Throughout this document, the phrase "non-initial fragments" is + used to mean fragments that do not contain all of the selector + values that may be needed for access control (e.g., they might not + contain Next Layer Protocol, source and destination ports, ICMP + message type/code, Mobility Header type). And the phrase "initial + fragment" is used to mean a fragment that contains all the + selector values needed for access control. However, it should be + noted that for IPv6, which fragment contains the Next Layer + Protocol and ports (or ICMP message type/code or Mobility Header + type [Mobip]) will depend on the kind and number of extension + headers present. The "initial fragment" might not be the first + fragment, in this context. + +4.4.1. The Security Policy Database (SPD) + + An SA is a management construct used to enforce security policy for + traffic crossing the IPsec boundary. Thus, an essential element of + SA processing is an underlying Security Policy Database (SPD) that + specifies what services are to be offered to IP datagrams and in what + fashion. The form of the database and its interface are outside the + scope of this specification. However, this section specifies minimum + management functionality that must be provided, to allow a user or + system administrator to control whether and how IPsec is applied to + traffic transmitted or received by a host or transiting a security + gateway. The SPD, or relevant caches, must be consulted during the + processing of all traffic (inbound and outbound), including traffic + not protected by IPsec, that traverses the IPsec boundary. This + includes IPsec management traffic such as IKE. An IPsec + + + +Kent & Seo Standards Track [Page 19] + +RFC 4301 Security Architecture for IP December 2005 + + + implementation MUST have at least one SPD, and it MAY support + multiple SPDs, if appropriate for the context in which the IPsec + implementation operates. There is no requirement to maintain SPDs on + a per-interface basis, as was specified in RFC 2401 [RFC2401]. + However, if an implementation supports multiple SPDs, then it MUST + include an explicit SPD selection function that is invoked to select + the appropriate SPD for outbound traffic processing. The inputs to + this function are the outbound packet and any local metadata (e.g., + the interface via which the packet arrived) required to effect the + SPD selection function. The output of the function is an SPD + identifier (SPD-ID). + + The SPD is an ordered database, consistent with the use of Access + Control Lists (ACLs) or packet filters in firewalls, routers, etc. + The ordering requirement arises because entries often will overlap + due to the presence of (non-trivial) ranges as values for selectors. + Thus, a user or administrator MUST be able to order the entries to + express a desired access control policy. There is no way to impose a + general, canonical order on SPD entries, because of the allowed use + of wildcards for selector values and because the different types of + selectors are not hierarchically related. + + Processing Choices: DISCARD, BYPASS, PROTECT + + An SPD must discriminate among traffic that is afforded IPsec + protection and traffic that is allowed to bypass IPsec. This + applies to the IPsec protection to be applied by a sender and to + the IPsec protection that must be present at the receiver. For + any outbound or inbound datagram, three processing choices are + possible: DISCARD, BYPASS IPsec, or PROTECT using IPsec. The + first choice refers to traffic that is not allowed to traverse the + IPsec boundary (in the specified direction). The second choice + refers to traffic that is allowed to cross the IPsec boundary + without IPsec protection. The third choice refers to traffic that + is afforded IPsec protection, and for such traffic the SPD must + specify the security protocols to be employed, their mode, + security service options, and the cryptographic algorithms to be + used. + + SPD-S, SPD-I, SPD-O + + An SPD is logically divided into three pieces. The SPD-S (secure + traffic) contains entries for all traffic subject to IPsec + protection. SPD-O (outbound) contains entries for all outbound + traffic that is to be bypassed or discarded. SPD-I (inbound) is + applied to inbound traffic that will be bypassed or discarded. + All three of these can be decorrelated (with the exception noted + above for native host implementations) to facilitate caching. If + + + +Kent & Seo Standards Track [Page 20] + +RFC 4301 Security Architecture for IP December 2005 + + + an IPsec implementation supports only one SPD, then the SPD + consists of all three parts. If multiple SPDs are supported, some + of them may be partial, e.g., some SPDs might contain only SPD-I + entries, to control inbound bypassed traffic on a per-interface + basis. The split allows SPD-I to be consulted without having to + consult SPD-S, for such traffic. Since the SPD-I is just a part + of the SPD, if a packet that is looked up in the SPD-I cannot be + matched to an entry there, then the packet MUST be discarded. + Note that for outbound traffic, if a match is not found in SPD-S, + then SPD-O must be checked to see if the traffic should be + bypassed. Similarly, if SPD-O is checked first and no match is + found, then SPD-S must be checked. In an ordered, + non-decorrelated SPD, the entries for the SPD-S, SPD-I, and SPD-O + are interleaved. So there is one lookup in the SPD. + + SPD Entries + + Each SPD entry specifies packet disposition as BYPASS, DISCARD, or + PROTECT. The entry is keyed by a list of one or more selectors. + The SPD contains an ordered list of these entries. The required + selector types are defined in Section 4.4.1.1. These selectors are + used to define the granularity of the SAs that are created in + response to an outbound packet or in response to a proposal from a + peer. The detailed structure of an SPD entry is described in + Section 4.4.1.2. Every SPD SHOULD have a nominal, final entry that + matches anything that is otherwise unmatched, and discards it. + + The SPD MUST permit a user or administrator to specify policy + entries as follows: + + - SPD-I: For inbound traffic that is to be bypassed or discarded, + the entry consists of the values of the selectors that apply to + the traffic to be bypassed or discarded. + + - SPD-O: For outbound traffic that is to be bypassed or + discarded, the entry consists of the values of the selectors + that apply to the traffic to be bypassed or discarded. + + - SPD-S: For traffic that is to be protected using IPsec, the + entry consists of the values of the selectors that apply to the + traffic to be protected via AH or ESP, controls on how to + create SAs based on these selectors, and the parameters needed + to effect this protection (e.g., algorithms, modes, etc.). Note + that an SPD-S entry also contains information such as "populate + from packet" (PFP) flag (see paragraphs below on "How To Derive + the Values for an SAD entry") and bits indicating whether the + + + + + +Kent & Seo Standards Track [Page 21] + +RFC 4301 Security Architecture for IP December 2005 + + + SA lookup makes use of the local and remote IP addresses in + addition to the SPI (see AH [Ken05b] or ESP [Ken05a] + specifications). + + Representing Directionality in an SPD Entry + + For traffic protected by IPsec, the Local and Remote address and + ports in an SPD entry are swapped to represent directionality, + consistent with IKE conventions. In general, the protocols that + IPsec deals with have the property of requiring symmetric SAs with + flipped Local/Remote IP addresses. However, for ICMP, there is + often no such bi-directional authorization requirement. + Nonetheless, for the sake of uniformity and simplicity, SPD + entries for ICMP are specified in the same way as for other + protocols. Note also that for ICMP, Mobility Header, and + non-initial fragments, there are no port fields in these packets. + ICMP has message type and code and Mobility Header has mobility + header type. Thus, SPD entries have provisions for expressing + access controls appropriate for these protocols, in lieu of the + normal port field controls. For bypassed or discarded traffic, + separate inbound and outbound entries are supported, e.g., to + permit unidirectional flows if required. + + OPAQUE and ANY + + For each selector in an SPD entry, in addition to the literal + values that define a match, there are two special values: ANY and + OPAQUE. ANY is a wildcard that matches any value in the + corresponding field of the packet, or that matches packets where + that field is not present or is obscured. OPAQUE indicates that + the corresponding selector field is not available for examination + because it may not be present in a fragment, it does not exist for + the given Next Layer Protocol, or prior application of IPsec may + have encrypted the value. The ANY value encompasses the OPAQUE + value. Thus, OPAQUE need be used only when it is necessary to + distinguish between the case of any allowed value for a field, vs. + the absence or unavailability (e.g., due to encryption) of the + field. + + How to Derive the Values for an SAD Entry + + For each selector in an SPD entry, the entry specifies how to + derive the corresponding values for a new SA Database (SAD, see + Section 4.4.2) entry from those in the SPD and the packet. The + goal is to allow an SAD entry and an SPD cache entry to be created + based on specific selector values from the packet, or from the + matching SPD entry. For outbound traffic, there are SPD-S cache + entries and SPD-O cache entries. For inbound traffic not + + + +Kent & Seo Standards Track [Page 22] + +RFC 4301 Security Architecture for IP December 2005 + + + protected by IPsec, there are SPD-I cache entries and there is the + SAD, which represents the cache for inbound IPsec-protected + traffic (see Section 4.4.2). If IPsec processing is specified for + an entry, a "populate from packet" (PFP) flag may be asserted for + one or more of the selectors in the SPD entry (Local IP address; + Remote IP address; Next Layer Protocol; and, depending on Next + Layer Protocol, Local port and Remote port, or ICMP type/code, or + Mobility Header type). If asserted for a given selector X, the + flag indicates that the SA to be created should take its value for + X from the value in the packet. Otherwise, the SA should take its + value(s) for X from the value(s) in the SPD entry. Note: In the + non-PFP case, the selector values negotiated by the SA management + protocol (e.g., IKEv2) may be a subset of those in the SPD entry, + depending on the SPD policy of the peer. Also, whether a single + flag is used for, e.g., source port, ICMP type/code, and Mobility + Header (MH) type, or a separate flag is used for each, is a local + matter. + + The following example illustrates the use of the PFP flag in the + context of a security gateway or a BITS/BITW implementation. + Consider an SPD entry where the allowed value for Remote address + is a range of IPv4 addresses: 192.0.2.1 to 192.0.2.10. Suppose an + outbound packet arrives with a destination address of 192.0.2.3, + and there is no extant SA to carry this packet. The value used + for the SA created to transmit this packet could be either of the + two values shown below, depending on what the SPD entry for this + selector says is the source of the selector value: + + PFP flag value example of new + for the Remote SAD dest. address + addr. selector selector value + --------------- ------------ + a. PFP TRUE 192.0.2.3 (one host) + b. PFP FALSE 192.0.2.1 to 192.0.2.10 (range of hosts) + + Note that if the SPD entry above had a value of ANY for the Remote + address, then the SAD selector value would have to be ANY for case + (b), but would still be as illustrated for case (a). Thus, the + PFP flag can be used to prohibit sharing of an SA, even among + packets that match the same SPD entry. + + Management Interface + + For every IPsec implementation, there MUST be a management + interface that allows a user or system administrator to manage the + SPD. The interface must allow the user (or administrator) to + specify the security processing to be applied to every packet that + traverses the IPsec boundary. (In a native host IPsec + + + +Kent & Seo Standards Track [Page 23] + +RFC 4301 Security Architecture for IP December 2005 + + + implementation making use of a socket interface, the SPD may not + need to be consulted on a per-packet basis, as noted at the end of + Section 4.4.1.1 and in Section 5.) The management interface for + the SPD MUST allow creation of entries consistent with the + selectors defined in Section 4.4.1.1, and MUST support (total) + ordering of these entries, as seen via this interface. The SPD + entries' selectors are analogous to the ACL or packet filters + commonly found in a stateless firewall or packet filtering router + and which are currently managed this way. + + In host systems, applications MAY be allowed to create SPD + entries. (The means of signaling such requests to the IPsec + implementation are outside the scope of this standard.) However, + the system administrator MUST be able to specify whether or not a + user or application can override (default) system policies. The + form of the management interface is not specified by this document + and may differ for hosts vs. security gateways, and within hosts + the interface may differ for socket-based vs. BITS + implementations. However, this document does specify a standard + set of SPD elements that all IPsec implementations MUST support. + + Decorrelation + + The processing model described in this document assumes the + ability to decorrelate overlapping SPD entries to permit caching, + which enables more efficient processing of outbound traffic in + security gateways and BITS/BITW implementations. Decorrelation + [CoSa04] is only a means of improving performance and simplifying + the processing description. This RFC does not require a compliant + implementation to make use of decorrelation. For example, native + host implementations typically make use of caching implicitly + because they bind SAs to socket interfaces, and thus there is no + requirement to be able to decorrelate SPD entries in these + implementations. + + Note: Unless otherwise qualified, the use of "SPD" refers to the + body of policy information in both ordered or decorrelated + (unordered) state. Appendix B provides an algorithm that can be + used to decorrelate SPD entries, but any algorithm that produces + equivalent output may be used. Note that when an SPD entry is + decorrelated all the resulting entries MUST be linked together, so + that all members of the group derived from an individual, SPD + entry (prior to decorrelation) can all be placed into caches and + into the SAD at the same time. For example, suppose one starts + with an entry A (from an ordered SPD) that when decorrelated, + yields entries A1, A2, and A3. When a packet comes along that + matches, say A2, and triggers the creation of an SA, the SA + management protocol (e.g., IKEv2) negotiates A. And all 3 + + + +Kent & Seo Standards Track [Page 24] + +RFC 4301 Security Architecture for IP December 2005 + + + decorrelated entries, A1, A2, and A3, are placed in the + appropriate SPD-S cache and linked to the SA. The intent is that + use of a decorrelated SPD ought not to create more SAs than would + have resulted from use of a not-decorrelated SPD. + + If a decorrelated SPD is employed, there are three options for + what an initiator sends to a peer via an SA management protocol + (e.g., IKE). By sending the complete set of linked, decorrelated + entries that were selected from the SPD, a peer is given the best + possible information to enable selection of the appropriate SPD + entry at its end, especially if the peer has also decorrelated its + SPD. However, if a large number of decorrelated entries are + linked, this may create large packets for SA negotiation, and + hence fragmentation problems for the SA management protocol. + + Alternatively, the original entry from the (correlated) SPD may be + retained and passed to the SA management protocol. Passing the + correlated SPD entry keeps the use of a decorrelated SPD a local + matter, not visible to peers, and avoids possible fragmentation + concerns, although it provides less precise information to a + responder for matching against the responder's SPD. + + An intermediate approach is to send a subset of the complete set + of linked, decorrelated SPD entries. This approach can avoid the + fragmentation problems cited above yet provide better information + than the original, correlated entry. The major shortcoming of + this approach is that it may cause additional SAs to be created + later, since only a subset of the linked, decorrelated entries are + sent to a peer. Implementers are free to employ any of the + approaches cited above. + + A responder uses the traffic selector proposals it receives via an + SA management protocol to select an appropriate entry in its SPD. + The intent of the matching is to select an SPD entry and create an + SA that most closely matches the intent of the initiator, so that + traffic traversing the resulting SA will be accepted at both ends. + If the responder employs a decorrelated SPD, it SHOULD use the + decorrelated SPD entries for matching, as this will generally + result in creation of SAs that are more likely to match the intent + of both peers. If the responder has a correlated SPD, then it + SHOULD match the proposals against the correlated entries. For + IKEv2, use of a decorrelated SPD offers the best opportunity for a + responder to generate a "narrowed" response. + + In all cases, when a decorrelated SPD is available, the + decorrelated entries are used to populate the SPD-S cache. If the + SPD is not decorrelated, caching is not allowed and an ordered + + + + +Kent & Seo Standards Track [Page 25] + +RFC 4301 Security Architecture for IP December 2005 + + + search of SPD MUST be performed to verify that inbound traffic + arriving on an SA is consistent with the access control policy + expressed in the SPD. + + Handling Changes to the SPD While the System Is Running + + If a change is made to the SPD while the system is running, a + check SHOULD be made of the effect of this change on extant SAs. + An implementation SHOULD check the impact of an SPD change on + extant SAs and SHOULD provide a user/administrator with a + mechanism for configuring what actions to take, e.g., delete an + affected SA, allow an affected SA to continue unchanged, etc. + +4.4.1.1. Selectors + + An SA may be fine-grained or coarse-grained, depending on the + selectors used to define the set of traffic for the SA. For example, + all traffic between two hosts may be carried via a single SA, and + afforded a uniform set of security services. Alternatively, traffic + between a pair of hosts might be spread over multiple SAs, depending + on the applications being used (as defined by the Next Layer Protocol + and related fields, e.g., ports), with different security services + offered by different SAs. Similarly, all traffic between a pair of + security gateways could be carried on a single SA, or one SA could be + assigned for each communicating host pair. The following selector + parameters MUST be supported by all IPsec implementations to + facilitate control of SA granularity. Note that both Local and + Remote addresses should either be IPv4 or IPv6, but not a mix of + address types. Also, note that the Local/Remote port selectors (and + ICMP message type and code, and Mobility Header type) may be labeled + as OPAQUE to accommodate situations where these fields are + inaccessible due to packet fragmentation. + + - Remote IP Address(es) (IPv4 or IPv6): This is a list of ranges + of IP addresses (unicast, broadcast (IPv4 only)). This + structure allows expression of a single IP address (via a + trivial range), or a list of addresses (each a trivial range), + or a range of addresses (low and high values, inclusive), as + well as the most generic form of a list of ranges. Address + ranges are used to support more than one remote system sharing + the same SA, e.g., behind a security gateway. + + - Local IP Address(es) (IPv4 or IPv6): This is a list of ranges of + IP addresses (unicast, broadcast (IPv4 only)). This structure + allows expression of a single IP address (via a trivial range), + or a list of addresses (each a trivial range), or a range of + addresses (low and high values, inclusive), as well as the most + generic form of a list of ranges. Address ranges are used to + + + +Kent & Seo Standards Track [Page 26] + +RFC 4301 Security Architecture for IP December 2005 + + + support more than one source system sharing the same SA, e.g., + behind a security gateway. Local refers to the address(es) + being protected by this implementation (or policy entry). + + Note: The SPD does not include support for multicast address + entries. To support multicast SAs, an implementation should + make use of a Group SPD (GSPD) as defined in [RFC3740]. GSPD + entries require a different structure, i.e., one cannot use the + symmetric relationship associated with local and remote address + values for unicast SAs in a multicast context. Specifically, + outbound traffic directed to a multicast address on an SA would + not be received on a companion, inbound SA with the multicast + address as the source. + + - Next Layer Protocol: Obtained from the IPv4 "Protocol" or the + IPv6 "Next Header" fields. This is an individual protocol + number, ANY, or for IPv6 only, OPAQUE. The Next Layer Protocol + is whatever comes after any IP extension headers that are + present. To simplify locating the Next Layer Protocol, there + SHOULD be a mechanism for configuring which IPv6 extension + headers to skip. The default configuration for which protocols + to skip SHOULD include the following protocols: 0 (Hop-by-hop + options), 43 (Routing Header), 44 (Fragmentation Header), and 60 + (Destination Options). Note: The default list does NOT include + 51 (AH) or 50 (ESP). From a selector lookup point of view, + IPsec treats AH and ESP as Next Layer Protocols. + + Several additional selectors depend on the Next Layer Protocol + value: + + * If the Next Layer Protocol uses two ports (as do TCP, UDP, + SCTP, and others), then there are selectors for Local and + Remote Ports. Each of these selectors has a list of ranges + of values. Note that the Local and Remote ports may not be + available in the case of receipt of a fragmented packet or if + the port fields have been protected by IPsec (encrypted); + thus, a value of OPAQUE also MUST be supported. Note: In a + non-initial fragment, port values will not be available. If + a port selector specifies a value other than ANY or OPAQUE, + it cannot match packets that are non-initial fragments. If + the SA requires a port value other than ANY or OPAQUE, an + arriving fragment without ports MUST be discarded. (See + Section 7, "Handling Fragments".) + + * If the Next Layer Protocol is a Mobility Header, then there + is a selector for IPv6 Mobility Header message type (MH type) + [Mobip]. This is an 8-bit value that identifies a particular + mobility message. Note that the MH type may not be available + + + +Kent & Seo Standards Track [Page 27] + +RFC 4301 Security Architecture for IP December 2005 + + + in the case of receipt of a fragmented packet. (See Section + 7, "Handling Fragments".) For IKE, the IPv6 Mobility Header + message type (MH type) is placed in the most significant + eight bits of the 16-bit local "port" selector. + + * If the Next Layer Protocol value is ICMP, then there is a + 16-bit selector for the ICMP message type and code. The + message type is a single 8-bit value, which defines the type + of an ICMP message, or ANY. The ICMP code is a single 8-bit + value that defines a specific subtype for an ICMP message. + For IKE, the message type is placed in the most significant 8 + bits of the 16-bit selector and the code is placed in the + least significant 8 bits. This 16-bit selector can contain a + single type and a range of codes, a single type and ANY code, + and ANY type and ANY code. Given a policy entry with a range + of Types (T-start to T-end) and a range of Codes (C-start to + C-end), and an ICMP packet with Type t and Code c, an + implementation MUST test for a match using + + (T-start*256) + C-start <= (t*256) + c <= (T-end*256) + + C-end + + Note that the ICMP message type and code may not be available + in the case of receipt of a fragmented packet. (See Section + 7, "Handling Fragments".) + + - Name: This is not a selector like the others above. It is not + acquired from a packet. A name may be used as a symbolic + identifier for an IPsec Local or Remote address. Named SPD + entries are used in two ways: + + 1. A named SPD entry is used by a responder (not an initiator) + in support of access control when an IP address would not be + appropriate for the Remote IP address selector, e.g., for + "road warriors". The name used to match this field is + communicated during the IKE negotiation in the ID payload. + In this context, the initiator's Source IP address (inner IP + header in tunnel mode) is bound to the Remote IP address in + the SAD entry created by the IKE negotiation. This address + overrides the Remote IP address value in the SPD, when the + SPD entry is selected in this fashion. All IPsec + implementations MUST support this use of names. + + 2. A named SPD entry may be used by an initiator to identify a + user for whom an IPsec SA will be created (or for whom + traffic may be bypassed). The initiator's IP source address + (from inner IP header in tunnel mode) is used to replace the + following if and when they are created: + + + +Kent & Seo Standards Track [Page 28] + +RFC 4301 Security Architecture for IP December 2005 + + + - local address in the SPD cache entry + - local address in the outbound SAD entry + - remote address in the inbound SAD entry + + Support for this use is optional for multi-user, native host + implementations and not applicable to other implementations. + Note that this name is used only locally; it is not + communicated by the key management protocol. Also, name + forms other than those used for case 1 above (responder) are + applicable in the initiator context (see below). + + An SPD entry can contain both a name (or a list of names) and + also values for the Local or Remote IP address. + + For case 1, responder, the identifiers employed in named SPD + entries are one of the following four types: + + a. a fully qualified user name string (email), e.g., + mozart@foo.example.com + (this corresponds to ID_RFC822_ADDR in IKEv2) + + b. a fully qualified DNS name, e.g., + foo.example.com + (this corresponds to ID_FQDN in IKEv2) + + c. X.500 distinguished name, e.g., [WaKiHo97], + CN = Stephen T. Kent, O = BBN Technologies, + SP = MA, C = US + (this corresponds to ID_DER_ASN1_DN in IKEv2, after + decoding) + + d. a byte string + (this corresponds to Key_ID in IKEv2) + + For case 2, initiator, the identifiers employed in named SPD + entries are of type byte string. They are likely to be Unix + UIDs, Windows security IDs, or something similar, but could + also be a user name or account name. In all cases, this + identifier is only of local concern and is not transmitted. + + The IPsec implementation context determines how selectors are used. + For example, a native host implementation typically makes use of a + socket interface. When a new connection is established, the SPD can + be consulted and an SA bound to the socket. Thus, traffic sent via + that socket need not result in additional lookups to the SPD (SPD-O + and SPD-S) cache. In contrast, a BITS, BITW, or security gateway + implementation needs to look at each packet and perform an + SPD-O/SPD-S cache lookup based on the selectors. + + + +Kent & Seo Standards Track [Page 29] + +RFC 4301 Security Architecture for IP December 2005 + + +4.4.1.2. Structure of an SPD Entry + + This section contains a prose description of an SPD entry. Also, + Appendix C provides an example of an ASN.1 definition of an SPD + entry. + + This text describes the SPD in a fashion that is intended to map + directly into IKE payloads to ensure that the policy required by SPD + entries can be negotiated through IKE. Unfortunately, the semantics + of the version of IKEv2 published concurrently with this document + [Kau05] do not align precisely with those defined for the SPD. + Specifically, IKEv2 does not enable negotiation of a single SA that + binds multiple pairs of local and remote addresses and ports to a + single SA. Instead, when multiple local and remote addresses and + ports are negotiated for an SA, IKEv2 treats these not as pairs, but + as (unordered) sets of local and remote values that can be + arbitrarily paired. Until IKE provides a facility that conveys the + semantics that are expressed in the SPD via selector sets (as + described below), users MUST NOT include multiple selector sets in a + single SPD entry unless the access control intent aligns with the IKE + "mix and match" semantics. An implementation MAY warn users, to + alert them to this problem if users create SPD entries with multiple + selector sets, the syntax of which indicates possible conflicts with + current IKE semantics. + + The management GUI can offer the user other forms of data entry and + display, e.g., the option of using address prefixes as well as + ranges, and symbolic names for protocols, ports, etc. (Do not confuse + the use of symbolic names in a management interface with the SPD + selector "Name".) Note that Remote/Local apply only to IP addresses + and ports, not to ICMP message type/code or Mobility Header type. + Also, if the reserved, symbolic selector value OPAQUE or ANY is + employed for a given selector type, only that value may appear in the + list for that selector, and it must appear only once in the list for + that selector. Note that ANY and OPAQUE are local syntax conventions + -- IKEv2 negotiates these values via the ranges indicated below: + + ANY: start = 0 end = <max> + OPAQUE: start = <max> end = 0 + + An SPD is an ordered list of entries each of which contains the + following fields. + + o Name -- a list of IDs. This quasi-selector is optional. + The forms that MUST be supported are described above in + Section 4.4.1.1 under "Name". + + + + + +Kent & Seo Standards Track [Page 30] + +RFC 4301 Security Architecture for IP December 2005 + + + o PFP flags -- one per traffic selector. A given flag, e.g., + for Next Layer Protocol, applies to the relevant selector + across all "selector sets" (see below) contained in an SPD + entry. When creating an SA, each flag specifies for the + corresponding traffic selector whether to instantiate the + selector from the corresponding field in the packet that + triggered the creation of the SA or from the value(s) in + the corresponding SPD entry (see Section 4.4.1, "How to + Derive the Values for an SAD Entry"). Whether a single + flag is used for, e.g., source port, ICMP type/code, and + MH type, or a separate flag is used for each, is a local + matter. There are PFP flags for: + - Local Address + - Remote Address + - Next Layer Protocol + - Local Port, or ICMP message type/code or Mobility + Header type (depending on the next layer protocol) + - Remote Port, or ICMP message type/code or Mobility + Header type (depending on the next layer protocol) + + o One to N selector sets that correspond to the "condition" + for applying a particular IPsec action. Each selector set + contains: + - Local Address + - Remote Address + - Next Layer Protocol + - Local Port, or ICMP message type/code or Mobility + Header type (depending on the next layer protocol) + - Remote Port, or ICMP message type/code or Mobility + Header type (depending on the next layer protocol) + + Note: The "next protocol" selector is an individual value + (unlike the local and remote IP addresses) in a selector + set entry. This is consistent with how IKEv2 negotiates + the Traffic Selector (TS) values for an SA. It also makes + sense because one may need to associate different port + fields with different protocols. It is possible to + associate multiple protocols (and ports) with a single SA + by specifying multiple selector sets for that SA. + + o Processing info -- which action is required -- PROTECT, + BYPASS, or DISCARD. There is just one action that goes + with all the selector sets, not a separate action for each + set. If the required processing is PROTECT, the entry + contains the following information. + - IPsec mode -- tunnel or transport + + + + + +Kent & Seo Standards Track [Page 31] + +RFC 4301 Security Architecture for IP December 2005 + + + - (if tunnel mode) local tunnel address -- For a + non-mobile host, if there is just one interface, this + is straightforward; if there are multiple + interfaces, this must be statically configured. For a + mobile host, the specification of the local address + is handled externally to IPsec. + - (if tunnel mode) remote tunnel address -- There is no + standard way to determine this. See 4.5.3, "Locating + a Security Gateway". + - Extended Sequence Number -- Is this SA using extended + sequence numbers? + - stateful fragment checking -- Is this SA using + stateful fragment checking? (See Section 7 for more + details.) + - Bypass DF bit (T/F) -- applicable to tunnel mode SAs + - Bypass DSCP (T/F) or map to unprotected DSCP values + (array) if needed to restrict bypass of DSCP values -- + applicable to tunnel mode SAs + - IPsec protocol -- AH or ESP + - algorithms -- which ones to use for AH, which ones to + use for ESP, which ones to use for combined mode, + ordered by decreasing priority + + It is a local matter as to what information is kept with regard to + handling extant SAs when the SPD is changed. + +4.4.1.3. More Regarding Fields Associated with Next Layer Protocols + + Additional selectors are often associated with fields in the Next + Layer Protocol header. A particular Next Layer Protocol can have + zero, one, or two selectors. There may be situations where there + aren't both local and remote selectors for the fields that are + dependent on the Next Layer Protocol. The IPv6 Mobility Header has + only a Mobility Header message type. AH and ESP have no further + selector fields. A system may be willing to send an ICMP message + type and code that it does not want to receive. In the descriptions + below, "port" is used to mean a field that is dependent on the Next + Layer Protocol. + + A. If a Next Layer Protocol has no "port" selectors, then + the Local and Remote "port" selectors are set to OPAQUE in + the relevant SPD entry, e.g., + + Local's + next layer protocol = AH + "port" selector = OPAQUE + + + + + +Kent & Seo Standards Track [Page 32] + +RFC 4301 Security Architecture for IP December 2005 + + + Remote's + next layer protocol = AH + "port" selector = OPAQUE + + B. Even if a Next Layer Protocol has only one selector, e.g., + Mobility Header type, then the Local and Remote "port" + selectors are used to indicate whether a system is + willing to send and/or receive traffic with the specified + "port" values. For example, if Mobility Headers of a + specified type are allowed to be sent and received via an + SA, then the relevant SPD entry would be set as follows: + + Local's + next layer protocol = Mobility Header + "port" selector = Mobility Header message type + + Remote's + next layer protocol = Mobility Header + "port" selector = Mobility Header message type + + If Mobility Headers of a specified type are allowed to be + sent but NOT received via an SA, then the relevant SPD + entry would be set as follows: + + Local's + next layer protocol = Mobility Header + "port" selector = Mobility Header message type + + Remote's + next layer protocol = Mobility Header + "port" selector = OPAQUE + + If Mobility Headers of a specified type are allowed to be + received but NOT sent via an SA, then the relevant SPD + entry would be set as follows: + + Local's + next layer protocol = Mobility Header + "port" selector = OPAQUE + + Remote's + next layer protocol = Mobility Header + "port" selector = Mobility Header message type + + C. If a system is willing to send traffic with a particular + "port" value but NOT receive traffic with that kind of + port value, the system's traffic selectors are set as + follows in the relevant SPD entry: + + + +Kent & Seo Standards Track [Page 33] + +RFC 4301 Security Architecture for IP December 2005 + + + Local's + next layer protocol = ICMP + "port" selector = <specific ICMP type & code> + + Remote's + next layer protocol = ICMP + "port" selector = OPAQUE + + D. To indicate that a system is willing to receive traffic + with a particular "port" value but NOT send that kind of + traffic, the system's traffic selectors are set as follows + in the relevant SPD entry: + + Local's + next layer protocol = ICMP + "port" selector = OPAQUE + + Remote's + next layer protocol = ICMP + "port" selector = <specific ICMP type & code> + + For example, if a security gateway is willing to allow + systems behind it to send ICMP traceroutes, but is not + willing to let outside systems run ICMP traceroutes to + systems behind it, then the security gateway's traffic + selectors are set as follows in the relevant SPD entry: + + Local's + next layer protocol = 1 (ICMPv4) + "port" selector = 30 (traceroute) + + Remote's + next layer protocol = 1 (ICMPv4) + "port" selector = OPAQUE + +4.4.2. Security Association Database (SAD) + + In each IPsec implementation, there is a nominal Security Association + Database (SAD), in which each entry defines the parameters associated + with one SA. Each SA has an entry in the SAD. For outbound + processing, each SAD entry is pointed to by entries in the SPD-S part + of the SPD cache. For inbound processing, for unicast SAs, the SPI + is used either alone to look up an SA or in conjunction with the + IPsec protocol type. If an IPsec implementation supports multicast, + the SPI plus destination address, or SPI plus destination and source + addresses are used to look up the SA. (See Section 4.1 for details on + the algorithm that MUST be used for mapping inbound IPsec datagrams + to SAs.) The following parameters are associated with each entry in + + + +Kent & Seo Standards Track [Page 34] + +RFC 4301 Security Architecture for IP December 2005 + + + the SAD. They should all be present except where otherwise noted, + e.g., AH Authentication algorithm. This description does not purport + to be a MIB, only a specification of the minimal data items required + to support an SA in an IPsec implementation. + + For each of the selectors defined in Section 4.4.1.1, the entry for + an inbound SA in the SAD MUST be initially populated with the value + or values negotiated at the time the SA was created. (See the + paragraph in Section 4.4.1 under "Handling Changes to the SPD while + the System is Running" for guidance on the effect of SPD changes on + extant SAs.) For a receiver, these values are used to check that the + header fields of an inbound packet (after IPsec processing) match the + selector values negotiated for the SA. Thus, the SAD acts as a cache + for checking the selectors of inbound traffic arriving on SAs. For + the receiver, this is part of verifying that a packet arriving on an + SA is consistent with the policy for the SA. (See Section 6 for rules + for ICMP messages.) These fields can have the form of specific + values, ranges, ANY, or OPAQUE, as described in Section 4.4.1.1, + "Selectors". Note also that there are a couple of situations in + which the SAD can have entries for SAs that do not have corresponding + entries in the SPD. Since this document does not mandate that the + SAD be selectively cleared when the SPD is changed, SAD entries can + remain when the SPD entries that created them are changed or deleted. + Also, if a manually keyed SA is created, there could be an SAD entry + for this SA that does not correspond to any SPD entry. + + Note: The SAD can support multicast SAs, if manually configured. An + outbound multicast SA has the same structure as a unicast SA. The + source address is that of the sender, and the destination address is + the multicast group address. An inbound, multicast SA must be + configured with the source addresses of each peer authorized to + transmit to the multicast SA in question. The SPI value for a + multicast SA is provided by a multicast group controller, not by the + receiver, as for a unicast SA. Because an SAD entry may be required + to accommodate multiple, individual IP source addresses that were + part of an SPD entry (for unicast SAs), the required facility for + inbound, multicast SAs is a feature already present in an IPsec + implementation. However, because the SPD has no provisions for + accommodating multicast entries, this document does not specify an + automated way to create an SAD entry for a multicast, inbound SA. + Only manually configured SAD entries can be created to accommodate + inbound, multicast traffic. + + Implementation Guidance: This document does not specify how an SPD-S + entry refers to the corresponding SAD entry, as this is an + implementation-specific detail. However, some implementations (based + on experience from RFC 2401) are known to have problems in this + regard. In particular, simply storing the (remote tunnel header IP + + + +Kent & Seo Standards Track [Page 35] + +RFC 4301 Security Architecture for IP December 2005 + + + address, remote SPI) pair in the SPD cache is not sufficient, since + the pair does not always uniquely identify a single SAD entry. For + instance, two hosts behind the same NAT could choose the same SPI + value. The situation also may arise if a host is assigned an IP + address (e.g., via DHCP) previously used by some other host, and the + SAs associated with the old host have not yet been deleted via dead + peer detection mechanisms. This may lead to packets being sent over + the wrong SA or, if key management ensures the pair is unique, + denying the creation of otherwise valid SAs. Thus, implementors + should implement links between the SPD cache and the SAD in a way + that does not engender such problems. + +4.4.2.1. Data Items in the SAD + + The following data items MUST be in the SAD: + + o Security Parameter Index (SPI): a 32-bit value selected by the + receiving end of an SA to uniquely identify the SA. In an SAD + entry for an outbound SA, the SPI is used to construct the + packet's AH or ESP header. In an SAD entry for an inbound SA, the + SPI is used to map traffic to the appropriate SA (see text on + unicast/multicast in Section 4.1). + + o Sequence Number Counter: a 64-bit counter used to generate the + Sequence Number field in AH or ESP headers. 64-bit sequence + numbers are the default, but 32-bit sequence numbers are also + supported if negotiated. + + o Sequence Counter Overflow: a flag indicating whether overflow of + the sequence number counter should generate an auditable event and + prevent transmission of additional packets on the SA, or whether + rollover is permitted. The audit log entry for this event SHOULD + include the SPI value, current date/time, Local Address, Remote + Address, and the selectors from the relevant SAD entry. + + o Anti-Replay Window: a 64-bit counter and a bit-map (or equivalent) + used to determine whether an inbound AH or ESP packet is a replay. + + Note: If anti-replay has been disabled by the receiver for an SA, + e.g., in the case of a manually keyed SA, then the Anti-Replay + Window is ignored for the SA in question. 64-bit sequence numbers + are the default, but this counter size accommodates 32-bit + sequence numbers as well. + + o AH Authentication algorithm, key, etc. This is required only if + AH is supported. + + + + + +Kent & Seo Standards Track [Page 36] + +RFC 4301 Security Architecture for IP December 2005 + + + o ESP Encryption algorithm, key, mode, IV, etc. If a combined mode + algorithm is used, these fields will not be applicable. + + o ESP integrity algorithm, keys, etc. If the integrity service is + not selected, these fields will not be applicable. If a combined + mode algorithm is used, these fields will not be applicable. + + o ESP combined mode algorithms, key(s), etc. This data is used when + a combined mode (encryption and integrity) algorithm is used with + ESP. If a combined mode algorithm is not used, these fields are + not applicable. + + o Lifetime of this SA: a time interval after which an SA must be + replaced with a new SA (and new SPI) or terminated, plus an + indication of which of these actions should occur. This may be + expressed as a time or byte count, or a simultaneous use of both + with the first lifetime to expire taking precedence. A compliant + implementation MUST support both types of lifetimes, and MUST + support a simultaneous use of both. If time is employed, and if + IKE employs X.509 certificates for SA establishment, the SA + lifetime must be constrained by the validity intervals of the + certificates, and the NextIssueDate of the Certificate Revocation + Lists (CRLs) used in the IKE exchange for the SA. Both initiator + and responder are responsible for constraining the SA lifetime in + this fashion. Note: The details of how to handle the refreshing + of keys when SAs expire is a local matter. However, one + reasonable approach is: + + (a) If byte count is used, then the implementation SHOULD count the + number of bytes to which the IPsec cryptographic algorithm is + applied. For ESP, this is the encryption algorithm (including + Null encryption) and for AH, this is the authentication + algorithm. This includes pad bytes, etc. Note that + implementations MUST be able to handle having the counters at + the ends of an SA get out of synch, e.g., because of packet + loss or because the implementations at each end of the SA + aren't doing things the same way. + + (b) There SHOULD be two kinds of lifetime -- a soft lifetime that + warns the implementation to initiate action such as setting up + a replacement SA, and a hard lifetime when the current SA ends + and is destroyed. + + (c) If the entire packet does not get delivered during the SA's + lifetime, the packet SHOULD be discarded. + + o IPsec protocol mode: tunnel or transport. Indicates which mode of + AH or ESP is applied to traffic on this SA. + + + +Kent & Seo Standards Track [Page 37] + +RFC 4301 Security Architecture for IP December 2005 + + + o Stateful fragment checking flag. Indicates whether or not + stateful fragment checking applies to this SA. + + o Bypass DF bit (T/F) -- applicable to tunnel mode SAs where both + inner and outer headers are IPv4. + + o DSCP values -- the set of DSCP values allowed for packets carried + over this SA. If no values are specified, no DSCP-specific + filtering is applied. If one or more values are specified, these + are used to select one SA among several that match the traffic + selectors for an outbound packet. Note that these values are NOT + checked against inbound traffic arriving on the SA. + + o Bypass DSCP (T/F) or map to unprotected DSCP values (array) if + needed to restrict bypass of DSCP values -- applicable to tunnel + mode SAs. This feature maps DSCP values from an inner header to + values in an outer header, e.g., to address covert channel + signaling concerns. + + o Path MTU: any observed path MTU and aging variables. + + o Tunnel header IP source and destination address -- both addresses + must be either IPv4 or IPv6 addresses. The version implies the + type of IP header to be used. Only used when the IPsec protocol + mode is tunnel. + +4.4.2.2. Relationship between SPD, PFP flag, packet, and SAD + + For each selector, the following tables show the relationship + between the value in the SPD, the PFP flag, the value in the + triggering packet, and the resulting value in the SAD. Note that + the administrative interface for IPsec can use various syntactic + options to make it easier for the administrator to enter rules. + For example, although a list of ranges is what IKEv2 sends, it + might be clearer and less error prone for the user to enter a + single IP address or IP address prefix. + + + + + + + + + + + + + + + +Kent & Seo Standards Track [Page 38] + +RFC 4301 Security Architecture for IP December 2005 + + + Value in + Triggering Resulting SAD + Selector SPD Entry PFP Packet Entry + -------- ---------------- --- ------------ -------------- + loc addr list of ranges 0 IP addr "S" list of ranges + ANY 0 IP addr "S" ANY + list of ranges 1 IP addr "S" "S" + ANY 1 IP addr "S" "S" + + rem addr list of ranges 0 IP addr "D" list of ranges + ANY 0 IP addr "D" ANY + list of ranges 1 IP addr "D" "D" + ANY 1 IP addr "D" "D" + + protocol list of prot's* 0 prot. "P" list of prot's* + ANY** 0 prot. "P" ANY + OPAQUE**** 0 prot. "P" OPAQUE + + list of prot's* 0 not avail. discard packet + ANY** 0 not avail. ANY + OPAQUE**** 0 not avail. OPAQUE + + list of prot's* 1 prot. "P" "P" + ANY** 1 prot. "P" "P" + OPAQUE**** 1 prot. "P" *** + + list of prot's* 1 not avail. discard packet + ANY** 1 not avail. discard packet + OPAQUE**** 1 not avail. *** + + + + + + + + + + + + + + + + + + + + + + +Kent & Seo Standards Track [Page 39] + +RFC 4301 Security Architecture for IP December 2005 + + + If the protocol is one that has two ports, then there will be + selectors for both Local and Remote ports. + + Value in + Triggering Resulting SAD + Selector SPD Entry PFP Packet Entry + -------- ---------------- --- ------------ -------------- + loc port list of ranges 0 src port "s" list of ranges + ANY 0 src port "s" ANY + OPAQUE 0 src port "s" OPAQUE + + list of ranges 0 not avail. discard packet + ANY 0 not avail. ANY + OPAQUE 0 not avail. OPAQUE + + list of ranges 1 src port "s" "s" + ANY 1 src port "s" "s" + OPAQUE 1 src port "s" *** + + list of ranges 1 not avail. discard packet + ANY 1 not avail. discard packet + OPAQUE 1 not avail. *** + + + rem port list of ranges 0 dst port "d" list of ranges + ANY 0 dst port "d" ANY + OPAQUE 0 dst port "d" OPAQUE + + list of ranges 0 not avail. discard packet + ANY 0 not avail. ANY + OPAQUE 0 not avail. OPAQUE + + list of ranges 1 dst port "d" "d" + ANY 1 dst port "d" "d" + OPAQUE 1 dst port "d" *** + + list of ranges 1 not avail. discard packet + ANY 1 not avail. discard packet + OPAQUE 1 not avail. *** + + + + + + + + + + + + +Kent & Seo Standards Track [Page 40] + +RFC 4301 Security Architecture for IP December 2005 + + + If the protocol is mobility header, then there will be a selector + for mh type. + + Value in + Triggering Resulting SAD + Selector SPD Entry PFP Packet Entry + -------- ---------------- --- ------------ -------------- + mh type list of ranges 0 mh type "T" list of ranges + ANY 0 mh type "T" ANY + OPAQUE 0 mh type "T" OPAQUE + + list of ranges 0 not avail. discard packet + ANY 0 not avail. ANY + OPAQUE 0 not avail. OPAQUE + + list of ranges 1 mh type "T" "T" + ANY 1 mh type "T" "T" + OPAQUE 1 mh type "T" *** + + list of ranges 1 not avail. discard packet + ANY 1 not avail. discard packet + OPAQUE 1 not avail. *** + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Kent & Seo Standards Track [Page 41] + +RFC 4301 Security Architecture for IP December 2005 + + + If the protocol is ICMP, then there will be a 16-bit selector for + ICMP type and ICMP code. Note that the type and code are bound to + each other, i.e., the codes apply to the particular type. This + 16-bit selector can contain a single type and a range of codes, a + single type and ANY code, and ANY type and ANY code. + + Value in + Triggering Resulting SAD + Selector SPD Entry PFP Packet Entry + --------- ---------------- --- ------------ -------------- + ICMP type a single type & 0 type "t" & single type & + and code range of codes code "c" range of codes + a single type & 0 type "t" & single type & + ANY code code "c" ANY code + ANY type & ANY 0 type "t" & ANY type & + code code "c" ANY code + OPAQUE 0 type "t" & OPAQUE + code "c" + + a single type & 0 not avail. discard packet + range of codes + a single type & 0 not avail. discard packet + ANY code + ANY type & 0 not avail. ANY type & + ANY code ANY code + OPAQUE 0 not avail. OPAQUE + + a single type & 1 type "t" & "t" and "c" + range of codes code "c" + a single type & 1 type "t" & "t" and "c" + ANY code code "c" + ANY type & 1 type "t" & "t" and "c" + ANY code code "c" + OPAQUE 1 type "t" & *** + code "c" + + a single type & 1 not avail. discard packet + range of codes + a single type & 1 not avail. discard packet + ANY code + ANY type & 1 not avail. discard packet + ANY code + OPAQUE 1 not avail. *** + + + + + + + + +Kent & Seo Standards Track [Page 42] + +RFC 4301 Security Architecture for IP December 2005 + + + If the name selector is used: + + Value in + Triggering Resulting SAD + Selector SPD Entry PFP Packet Entry + --------- ---------------- --- ------------ -------------- + name list of user or N/A N/A N/A + system names + + * "List of protocols" is the information, not the way + that the SPD or SAD or IKEv2 have to represent this + information. + ** 0 (zero) is used by IKE to indicate ANY for + protocol. + *** Use of PFP=1 with an OPAQUE value is an error and + SHOULD be prohibited by an IPsec implementation. + **** The protocol field cannot be OPAQUE in IPv4. This + table entry applies only to IPv6. + +4.4.3. Peer Authorization Database (PAD) + + The Peer Authorization Database (PAD) provides the link between the + SPD and a security association management protocol such as IKE. It + embodies several critical functions: + + o identifies the peers or groups of peers that are authorized + to communicate with this IPsec entity + o specifies the protocol and method used to authenticate each + peer + o provides the authentication data for each peer + o constrains the types and values of IDs that can be asserted + by a peer with regard to child SA creation, to ensure that the + peer does not assert identities for lookup in the SPD that it + is not authorized to represent, when child SAs are created + o peer gateway location info, e.g., IP address(es) or DNS names, + MAY be included for peers that are known to be "behind" a + security gateway + + The PAD provides these functions for an IKE peer when the peer acts + as either the initiator or the responder. + + To perform these functions, the PAD contains an entry for each peer + or group of peers with which the IPsec entity will communicate. An + entry names an individual peer (a user, end system or security + gateway) or specifies a group of peers (using ID matching rules + defined below). The entry specifies the authentication protocol + (e.g., IKEv1, IKEv2, KINK) method used (e.g., certificates or pre- + shared secrets) and the authentication data (e.g., the pre-shared + + + +Kent & Seo Standards Track [Page 43] + +RFC 4301 Security Architecture for IP December 2005 + + + secret or the trust anchor relative to which the peer's certificate + will be validated). For certificate-based authentication, the entry + also may provide information to assist in verifying the revocation + status of the peer, e.g., a pointer to a CRL repository or the name + of an Online Certificate Status Protocol (OCSP) server associated + with the peer or with the trust anchor associated with the peer. + + Each entry also specifies whether the IKE ID payload will be used as + a symbolic name for SPD lookup, or whether the remote IP address + provided in traffic selector payloads will be used for SPD lookups + when child SAs are created. + + Note that the PAD information MAY be used to support creation of more + than one tunnel mode SA at a time between two peers, e.g., two + tunnels to protect the same addresses/hosts, but with different + tunnel endpoints. + +4.4.3.1. PAD Entry IDs and Matching Rules + + The PAD is an ordered database, where the order is defined by an + administrator (or a user in the case of a single-user end system). + Usually, the same administrator will be responsible for both the PAD + and SPD, since the two databases must be coordinated. The ordering + requirement for the PAD arises for the same reason as for the SPD, + i.e., because use of "star name" entries allows for overlaps in the + set of IKE IDs that could match a specific entry. + + Six types of IDs are supported for entries in the PAD, consistent + with the symbolic name types and IP addresses used to identify SPD + entries. The ID for each entry acts as the index for the PAD, i.e., + it is the value used to select an entry. All of these ID types can + be used to match IKE ID payload types. The six types are: + + o DNS name (specific or partial) + o Distinguished Name (complete or sub-tree constrained) + o RFC 822 email address (complete or partially qualified) + o IPv4 address (range) + o IPv6 address (range) + o Key ID (exact match only) + + The first three name types can accommodate sub-tree matching as well + as exact matches. A DNS name may be fully qualified and thus match + exactly one name, e.g., foo.example.com. Alternatively, the name may + encompass a group of peers by being partially specified, e.g., the + string ".example.com" could be used to match any DNS name ending in + these two domain name components. + + + + + +Kent & Seo Standards Track [Page 44] + +RFC 4301 Security Architecture for IP December 2005 + + + Similarly, a Distinguished Name may specify a complete Distinguished + Name to match exactly one entry, e.g., CN = Stephen, O = BBN + Technologies, SP = MA, C = US. Alternatively, an entry may encompass + a group of peers by specifying a sub-tree, e.g., an entry of the form + "C = US, SP = MA" might be used to match all DNs that contain these + two attributes as the top two Relative Distinguished Names (RDNs). + + For an RFC 822 e-mail addresses, the same options exist. A complete + address such as foo@example.com matches one entity, but a sub-tree + name such as "@example.com" could be used to match all the entities + with names ending in those two domain names to the right of the @. + + The specific syntax used by an implementation to accommodate sub-tree + matching for distinguished names, domain names or RFC 822 e-mail + addresses is a local matter. But, at a minimum, sub-tree matching of + the sort described above MUST be supported. (Substring matching + within a DN, DNS name, or RFC 822 address MAY be supported, but is + not required.) + + For IPv4 and IPv6 addresses, the same address range syntax used for + SPD entries MUST be supported. This allows specification of an + individual address (via a trivial range), an address prefix (by + choosing a range that adheres to Classless Inter-Domain Routing + (CIDR)-style prefixes), or an arbitrary address range. + + The Key ID field is defined as an OCTET string in IKE. For this name + type, only exact-match syntax MUST be supported (since there is no + explicit structure for this ID type). Additional matching functions + MAY be supported for this ID type. + +4.4.3.2. IKE Peer Authentication Data + + Once an entry is located based on an ordered search of the PAD based + on ID field matching, it is necessary to verify the asserted + identity, i.e., to authenticate the asserted ID. For each PAD entry, + there is an indication of the type of authentication to be performed. + This document requires support for two required authentication data + types: + + - X.509 certificate + - pre-shared secret + + For authentication based on an X.509 certificate, the PAD entry + contains a trust anchor via which the end entity (EE) certificate for + the peer must be verifiable, either directly or via a certificate + path. See RFC 3280 for the definition of a trust anchor. An entry + used with certificate-based authentication MAY include additional + data to facilitate certificate revocation status, e.g., a list of + + + +Kent & Seo Standards Track [Page 45] + +RFC 4301 Security Architecture for IP December 2005 + + + appropriate OCSP responders or CRL repositories, and associated + authentication data. For authentication based on a pre-shared + secret, the PAD contains the pre-shared secret to be used by IKE. + + This document does not require that the IKE ID asserted by a peer be + syntactically related to a specific field in an end entity + certificate that is employed to authenticate the identity of that + peer. However, it often will be appropriate to impose such a + requirement, e.g., when a single entry represents a set of peers each + of whom may have a distinct SPD entry. Thus, implementations MUST + provide a means for an administrator to require a match between an + asserted IKE ID and the subject name or subject alt name in a + certificate. The former is applicable to IKE IDs expressed as + distinguished names; the latter is appropriate for DNS names, RFC 822 + e-mail addresses, and IP addresses. Since KEY ID is intended for + identifying a peer authenticated via a pre-shared secret, there is no + requirement to match this ID type to a certificate field. + + See IKEv1 [HarCar98] and IKEv2 [Kau05] for details of how IKE + performs peer authentication using certificates or pre-shared + secrets. + + This document does not mandate support for any other authentication + methods, although such methods MAY be employed. + +4.4.3.3. Child SA Authorization Data + + Once an IKE peer is authenticated, child SAs may be created. Each + PAD entry contains data to constrain the set of IDs that can be + asserted by an IKE peer, for matching against the SPD. Each PAD + entry indicates whether the IKE ID is to be used as a symbolic name + for SPD matching, or whether an IP address asserted in a traffic + selector payload is to be used. + + If the entry indicates that the IKE ID is to be used, then the PAD + entry ID field defines the authorized set of IDs. If the entry + indicates that child SAs traffic selectors are to be used, then an + additional data element is required, in the form of IPv4 and/or IPv6 + address ranges. (A peer may be authorized for both address types, so + there MUST be provision for both a v4 and a v6 address range.) + +4.4.3.4. How the PAD Is Used + + During the initial IKE exchange, the initiator and responder each + assert their identity via the IKE ID payload and send an AUTH payload + to verify the asserted identity. One or more CERT payloads may be + transmitted to facilitate the verification of each asserted identity. + + + + +Kent & Seo Standards Track [Page 46] + +RFC 4301 Security Architecture for IP December 2005 + + + When an IKE entity receives an IKE ID payload, it uses the asserted + ID to locate an entry in the PAD, using the matching rules described + above. The PAD entry specifies the authentication method to be + employed for the identified peer. This ensures that the right method + is used for each peer and that different methods can be used for + different peers. The entry also specifies the authentication data + that will be used to verify the asserted identity. This data is + employed in conjunction with the specified method to authenticate the + peer, before any CHILD SAs are created. + + Child SAs are created based on the exchange of traffic selector + payloads, either at the end of the initial IKE exchange or in + subsequent CREATE_CHILD_SA exchanges. The PAD entry for the (now + authenticated) IKE peer is used to constrain creation of child SAs; + specifically, the PAD entry specifies how the SPD is searched using a + traffic selector proposal from a peer. There are two choices: either + the IKE ID asserted by the peer is used to find an SPD entry via its + symbolic name, or peer IP addresses asserted in traffic selector + payloads are used for SPD lookups based on the remote IP address + field portion of an SPD entry. It is necessary to impose these + constraints on creation of child SAs to prevent an authenticated peer + from spoofing IDs associated with other, legitimate peers. + + Note that because the PAD is checked before searching for an SPD + entry, this safeguard protects an initiator against spoofing attacks. + For example, assume that IKE A receives an outbound packet destined + for IP address X, a host served by a security gateway. RFC 2401 + [RFC2401] and this document do not specify how A determines the + address of the IKE peer serving X. However, any peer contacted by A + as the presumed representative for X must be registered in the PAD in + order to allow the IKE exchange to be authenticated. Moreover, when + the authenticated peer asserts that it represents X in its traffic + selector exchange, the PAD will be consulted to determine if the peer + in question is authorized to represent X. Thus, the PAD provides a + binding of address ranges (or name sub-spaces) to peers, to counter + such attacks. + +4.5. SA and Key Management + + All IPsec implementations MUST support both manual and automated SA + and cryptographic key management. The IPsec protocols, AH and ESP, + are largely independent of the associated SA management techniques, + although the techniques involved do affect some of the security + services offered by the protocols. For example, the optional + anti-replay service available for AH and ESP requires automated SA + management. Moreover, the granularity of key distribution employed + with IPsec determines the granularity of authentication provided. In + general, data origin authentication in AH and ESP is limited by the + + + +Kent & Seo Standards Track [Page 47] + +RFC 4301 Security Architecture for IP December 2005 + + + extent to which secrets used with the integrity algorithm (or with a + key management protocol that creates such secrets) are shared among + multiple possible sources. + + The following text describes the minimum requirements for both types + of SA management. + +4.5.1. Manual Techniques + + The simplest form of management is manual management, in which a + person manually configures each system with keying material and SA + management data relevant to secure communication with other systems. + Manual techniques are practical in small, static environments but + they do not scale well. For example, a company could create a + virtual private network (VPN) using IPsec in security gateways at + several sites. If the number of sites is small, and since all the + sites come under the purview of a single administrative domain, this + might be a feasible context for manual management techniques. In + this case, the security gateway might selectively protect traffic to + and from other sites within the organization using a manually + configured key, while not protecting traffic for other destinations. + It also might be appropriate when only selected communications need + to be secured. A similar argument might apply to use of IPsec + entirely within an organization for a small number of hosts and/or + gateways. Manual management techniques often employ statically + configured, symmetric keys, though other options also exist. + +4.5.2. Automated SA and Key Management + + Widespread deployment and use of IPsec requires an Internet-standard, + scalable, automated, SA management protocol. Such support is + required to facilitate use of the anti-replay features of AH and ESP, + and to accommodate on-demand creation of SAs, e.g., for user- and + session-oriented keying. (Note that the notion of "rekeying" an SA + actually implies creation of a new SA with a new SPI, a process that + generally implies use of an automated SA/key management protocol.) + + The default automated key management protocol selected for use with + IPsec is IKEv2 [Kau05]. This document assumes the availability of + certain functions from the key management protocol that are not + supported by IKEv1. Other automated SA management protocols MAY be + employed. + + When an automated SA/key management protocol is employed, the output + from this protocol is used to generate multiple keys for a single SA. + This also occurs because distinct keys are used for each of the two + + + + + +Kent & Seo Standards Track [Page 48] + +RFC 4301 Security Architecture for IP December 2005 + + + SAs created by IKE. If both integrity and confidentiality are + employed, then a minimum of four keys are required. Additionally, + some cryptographic algorithms may require multiple keys, e.g., 3DES. + + The Key Management System may provide a separate string of bits for + each key or it may generate one string of bits from which all keys + are extracted. If a single string of bits is provided, care needs to + be taken to ensure that the parts of the system that map the string + of bits to the required keys do so in the same fashion at both ends + of the SA. To ensure that the IPsec implementations at each end of + the SA use the same bits for the same keys, and irrespective of which + part of the system divides the string of bits into individual keys, + the encryption keys MUST be taken from the first (left-most, + high-order) bits and the integrity keys MUST be taken from the + remaining bits. The number of bits for each key is defined in the + relevant cryptographic algorithm specification RFC. In the case of + multiple encryption keys or multiple integrity keys, the + specification for the cryptographic algorithm must specify the order + in which they are to be selected from a single string of bits + provided to the cryptographic algorithm. + +4.5.3. Locating a Security Gateway + + This section discusses issues relating to how a host learns about the + existence of relevant security gateways and, once a host has + contacted these security gateways, how it knows that these are the + correct security gateways. The details of where the required + information is stored is a local matter, but the Peer Authorization + Database (PAD) described in Section 4.4 is the most likely candidate. + (Note: S* indicates a system that is running IPsec, e.g., SH1 and SG2 + below.) + + Consider a situation in which a remote host (SH1) is using the + Internet to gain access to a server or other machine (H2) and there + is a security gateway (SG2), e.g., a firewall, through which H1's + traffic must pass. An example of this situation would be a mobile + host crossing the Internet to his home organization's firewall (SG2). + This situation raises several issues: + + 1. How does SH1 know/learn about the existence of the security + gateway SG2? + + 2. How does it authenticate SG2, and once it has authenticated SG2, + how does it confirm that SG2 has been authorized to represent H2? + + 3. How does SG2 authenticate SH1 and verify that SH1 is authorized to + contact H2? + + + + +Kent & Seo Standards Track [Page 49] + +RFC 4301 Security Architecture for IP December 2005 + + + 4. How does SH1 know/learn about any additional gateways that provide + alternate paths to H2? + + To address these problems, an IPsec-supporting host or security + gateway MUST have an administrative interface that allows the + user/administrator to configure the address of one or more security + gateways for ranges of destination addresses that require its use. + This includes the ability to configure information for locating and + authenticating one or more security gateways and verifying the + authorization of these gateways to represent the destination host. + (The authorization function is implied in the PAD.) This document + does not address the issue of how to automate the + discovery/verification of security gateways. + +4.6. SAs and Multicast + + The receiver-orientation of the SA implies that, in the case of + unicast traffic, the destination system will select the SPI value. + By having the destination select the SPI value, there is no potential + for manually configured SAs to conflict with automatically configured + (e.g., via a key management protocol) SAs or for SAs from multiple + sources to conflict with each other. For multicast traffic, there + are multiple destination systems associated with a single SA. So + some system or person will need to coordinate among all multicast + groups to select an SPI or SPIs on behalf of each multicast group and + then communicate the group's IPsec information to all of the + legitimate members of that multicast group via mechanisms not defined + here. + + Multiple senders to a multicast group SHOULD use a single Security + Association (and hence SPI) for all traffic to that group when a + symmetric key encryption or integrity algorithm is employed. In such + circumstances, the receiver knows only that the message came from a + system possessing the key for that multicast group. In such + circumstances, a receiver generally will not be able to authenticate + which system sent the multicast traffic. Specifications for other, + more general multicast approaches are deferred to the IETF Multicast + Security Working Group. + +5. IP Traffic Processing + + As mentioned in Section 4.4.1, "The Security Policy Database (SPD)", + the SPD (or associated caches) MUST be consulted during the + processing of all traffic that crosses the IPsec protection boundary, + including IPsec management traffic. If no policy is found in the SPD + that matches a packet (for either inbound or outbound traffic), the + packet MUST be discarded. To simplify processing, and to allow for + very fast SA lookups (for SG/BITS/BITW), this document introduces the + + + +Kent & Seo Standards Track [Page 50] + +RFC 4301 Security Architecture for IP December 2005 + + + notion of an SPD cache for all outbound traffic (SPD-O plus SPD-S), + and a cache for inbound, non-IPsec-protected traffic (SPD-I). (As + mentioned earlier, the SAD acts as a cache for checking the selectors + of inbound IPsec-protected traffic arriving on SAs.) There is + nominally one cache per SPD. For the purposes of this specification, + it is assumed that each cached entry will map to exactly one SA. + Note, however, exceptions arise when one uses multiple SAs to carry + traffic of different priorities (e.g., as indicated by distinct DSCP + values) but the same selectors. Note also, that there are a couple + of situations in which the SAD can have entries for SAs that do not + have corresponding entries in the SPD. Since this document does not + mandate that the SAD be selectively cleared when the SPD is changed, + SAD entries can remain when the SPD entries that created them are + changed or deleted. Also, if a manually keyed SA is created, there + could be an SAD entry for this SA that does not correspond to any SPD + entry. + + Since SPD entries may overlap, one cannot safely cache these entries + in general. Simple caching might result in a match against a cache + entry, whereas an ordered search of the SPD would have resulted in a + match against a different entry. But, if the SPD entries are first + decorrelated, then the resulting entries can safely be cached. Each + cached entry will indicate that matching traffic should be bypassed + or discarded, appropriately. (Note: The original SPD entry might + result in multiple SAs, e.g., because of PFP.) Unless otherwise + noted, all references below to the "SPD" or "SPD cache" or "cache" + are to a decorrelated SPD (SPD-I, SPD-O, SPD-S) or the SPD cache + containing entries from the decorrelated SPD. + + Note: In a host IPsec implementation based on sockets, the SPD will + be consulted whenever a new socket is created to determine what, if + any, IPsec processing will be applied to the traffic that will flow + on that socket. This provides an implicit caching mechanism, and the + portions of the preceding discussion that address caching can be + ignored in such implementations. + + Note: It is assumed that one starts with a correlated SPD because + that is how users and administrators are accustomed to managing these + sorts of access control lists or firewall filter rules. Then the + decorrelation algorithm is applied to build a list of cache-able SPD + entries. The decorrelation is invisible at the management interface. + + For inbound IPsec traffic, the SAD entry selected by the SPI serves + as the cache for the selectors to be matched against arriving IPsec + packets, after AH or ESP processing has been performed. + + + + + + +Kent & Seo Standards Track [Page 51] + +RFC 4301 Security Architecture for IP December 2005 + + +5.1. Outbound IP Traffic Processing (protected-to-unprotected) + + First consider the path for traffic entering the implementation via a + protected interface and exiting via an unprotected interface. + + Unprotected Interface + ^ + | + (nested SAs) +----------+ + -------------------|Forwarding|<-----+ + | +----------+ | + | ^ | + | | BYPASS | + V +-----+ | + +-------+ | SPD | +--------+ + ...| SPD-I |.................|Cache|.....|PROCESS |...IPsec + | (*) | | (*) |---->|(AH/ESP)| boundary + +-------+ +-----+ +--------+ + | +-------+ / ^ + | |DISCARD| <--/ | + | +-------+ | + | | + | +-------------+ + |---------------->|SPD Selection| + +-------------+ + ^ + | +------+ + | -->| ICMP | + | / +------+ + |/ + | + | + Protected Interface + + + Figure 2. Processing Model for Outbound Traffic + (*) = The SPD caches are shown here. If there + is a cache miss, then the SPD is checked. + There is no requirement that an + implementation buffer the packet if + there is a cache miss. + + + + + + + + + + +Kent & Seo Standards Track [Page 52] + +RFC 4301 Security Architecture for IP December 2005 + + + IPsec MUST perform the following steps when processing outbound + packets: + + 1. When a packet arrives from the subscriber (protected) interface, + invoke the SPD selection function to obtain the SPD-ID needed to + choose the appropriate SPD. (If the implementation uses only one + SPD, this step is a no-op.) + + 2. Match the packet headers against the cache for the SPD specified + by the SPD-ID from step 1. Note that this cache contains entries + from SPD-O and SPD-S. + + 3a. If there is a match, then process the packet as specified by the + matching cache entry, i.e., BYPASS, DISCARD, or PROTECT using AH + or ESP. If IPsec processing is applied, there is a link from the + SPD cache entry to the relevant SAD entry (specifying the mode, + cryptographic algorithms, keys, SPI, PMTU, etc.). IPsec + processing is as previously defined, for tunnel or transport + modes and for AH or ESP, as specified in their respective RFCs + [Ken05b, Ken05a]. Note that the SA PMTU value, plus the value of + the stateful fragment checking flag (and the DF bit in the IP + header of the outbound packet) determine whether the packet can + (must) be fragmented prior to or after IPsec processing, or if it + must be discarded and an ICMP PMTU message is sent. + + 3b. If no match is found in the cache, search the SPD (SPD-S and + SPD-O parts) specified by SPD-ID. If the SPD entry calls for + BYPASS or DISCARD, create one or more new outbound SPD cache + entries and if BYPASS, create one or more new inbound SPD cache + entries. (More than one cache entry may be created since a + decorrelated SPD entry may be linked to other such entries that + were created as a side effect of the decorrelation process.) If + the SPD entry calls for PROTECT, i.e., creation of an SA, the key + management mechanism (e.g., IKEv2) is invoked to create the SA. + If SA creation succeeds, a new outbound (SPD-S) cache entry is + created, along with outbound and inbound SAD entries, otherwise + the packet is discarded. (A packet that triggers an SPD lookup + MAY be discarded by the implementation, or it MAY be processed + against the newly created cache entry, if one is created.) Since + SAs are created in pairs, an SAD entry for the corresponding + inbound SA also is created, and it contains the selector values + derived from the SPD entry (and packet, if any PFP flags were + "true") used to create the inbound SA, for use in checking + inbound traffic delivered via the SA. + + 4. The packet is passed to the outbound forwarding function + (operating outside of the IPsec implementation), to select the + interface to which the packet will be directed. This function + + + +Kent & Seo Standards Track [Page 53] + +RFC 4301 Security Architecture for IP December 2005 + + + may cause the packet to be passed back across the IPsec boundary, + for additional IPsec processing, e.g., in support of nested SAs. + If so, there MUST be an entry in SPD-I database that permits + inbound bypassing of the packet, otherwise the packet will be + discarded. If necessary, i.e., if there is more than one SPD-I, + the traffic being looped back MAY be tagged as coming from this + internal interface. This would allow the use of a different + SPD-I for "real" external traffic vs. looped traffic, if needed. + + Note: With the exception of IPv4 and IPv6 transport mode, an SG, + BITS, or BITW implementation MAY fragment packets before applying + IPsec. (This applies only to IPv4. For IPv6 packets, only the + originator is allowed to fragment them.) The device SHOULD have a + configuration setting to disable this. The resulting fragments are + evaluated against the SPD in the normal manner. Thus, fragments not + containing port numbers (or ICMP message type and code, or Mobility + Header type) will only match rules having port (or ICMP message type + and code, or MH type) selectors of OPAQUE or ANY. (See Section 7 for + more details.) + + Note: With regard to determining and enforcing the PMTU of an SA, the + IPsec system MUST follow the steps described in Section 8.2. + +5.1.1. Handling an Outbound Packet That Must Be Discarded + + If an IPsec system receives an outbound packet that it finds it must + discard, it SHOULD be capable of generating and sending an ICMP + message to indicate to the sender of the outbound packet that the + packet was discarded. The type and code of the ICMP message will + depend on the reason for discarding the packet, as specified below. + The reason SHOULD be recorded in the audit log. The audit log entry + for this event SHOULD include the reason, current date/time, and the + selector values from the packet. + + a. The selectors of the packet matched an SPD entry requiring the + packet to be discarded. + + IPv4 Type = 3 (destination unreachable) Code = 13 + (Communication Administratively Prohibited) + + IPv6 Type = 1 (destination unreachable) Code = 1 + (Communication with destination administratively + prohibited) + + b1. The IPsec system successfully reached the remote peer but was + unable to negotiate the SA required by the SPD entry matching the + packet because, for example, the remote peer is administratively + prohibited from communicating with the initiator, the initiating + + + +Kent & Seo Standards Track [Page 54] + +RFC 4301 Security Architecture for IP December 2005 + + + peer was unable to authenticate itself to the remote peer, the + remote peer was unable to authenticate itself to the initiating + peer, or the SPD at the remote peer did not have a suitable + entry. + + IPv4 Type = 3 (destination unreachable) Code = 13 + (Communication Administratively Prohibited) + + IPv6 Type = 1 (destination unreachable) Code = 1 + (Communication with destination administratively + prohibited) + + b2. The IPsec system was unable to set up the SA required by the SPD + entry matching the packet because the IPsec peer at the other end + of the exchange could not be contacted. + + IPv4 Type = 3 (destination unreachable) Code = 1 (host + unreachable) + + IPv6 Type = 1 (destination unreachable) Code = 3 (address + unreachable) + + Note that an attacker behind a security gateway could send packets + with a spoofed source address, W.X.Y.Z, to an IPsec entity causing it + to send ICMP messages to W.X.Y.Z. This creates an opportunity for a + denial of service (DoS) attack among hosts behind a security gateway. + To address this, a security gateway SHOULD include a management + control to allow an administrator to configure an IPsec + implementation to send or not send the ICMP messages under these + circumstances, and if this facility is selected, to rate limit the + transmission of such ICMP responses. + +5.1.2. Header Construction for Tunnel Mode + + This section describes the handling of the inner and outer IP + headers, extension headers, and options for AH and ESP tunnels, with + regard to outbound traffic processing. This includes how to + construct the encapsulating (outer) IP header, how to process fields + in the inner IP header, and what other actions should be taken for + outbound, tunnel mode traffic. The general processing described here + is modeled after RFC 2003, "IP Encapsulation within IP" [Per96]: + + o The outer IP header Source Address and Destination Address + identify the "endpoints" of the tunnel (the encapsulator and + decapsulator). The inner IP header Source Address and Destination + Addresses identify the original sender and recipient of the + datagram (from the perspective of this tunnel), respectively. + + + + +Kent & Seo Standards Track [Page 55] + +RFC 4301 Security Architecture for IP December 2005 + + + (See footnote 3 after the table in 5.1.2.1 for more details on the + encapsulating source IP address.) + + o The inner IP header is not changed except as noted below for TTL + (or Hop Limit) and the DS/ECN Fields. The inner IP header + otherwise remains unchanged during its delivery to the tunnel exit + point. + + o No change to IP options or extension headers in the inner header + occurs during delivery of the encapsulated datagram through the + tunnel. + + Note: IPsec tunnel mode is different from IP-in-IP tunneling (RFC + 2003 [Per96]) in several ways: + + o IPsec offers certain controls to a security administrator to + manage covert channels (which would not normally be a concern for + tunneling) and to ensure that the receiver examines the right + portions of the received packet with respect to application of + access controls. An IPsec implementation MAY be configurable with + regard to how it processes the outer DS field for tunnel mode for + transmitted packets. For outbound traffic, one configuration + setting for the outer DS field will operate as described in the + following sections on IPv4 and IPv6 header processing for IPsec + tunnels. Another will allow the outer DS field to be mapped to a + fixed value, which MAY be configured on a per-SA basis. (The value + might really be fixed for all traffic outbound from a device, but + per-SA granularity allows that as well.) This configuration option + allows a local administrator to decide whether the covert channel + provided by copying these bits outweighs the benefits of copying. + + o IPsec describes how to handle ECN or DS and provides the ability + to control propagation of changes in these fields between + unprotected and protected domains. In general, propagation from a + protected to an unprotected domain is a covert channel and thus + controls are provided to manage the bandwidth of this channel. + Propagation of ECN values in the other direction are controlled so + that only legitimate ECN changes (indicating occurrence of + congestion between the tunnel endpoints) are propagated. By + default, DS propagation from an unprotected domain to a protected + domain is not permitted. However, if the sender and receiver do + not share the same DS code space, and the receiver has no way of + learning how to map between the two spaces, then it may be + appropriate to deviate from the default. Specifically, an IPsec + implementation MAY be configurable in terms of how it processes + the outer DS field for tunnel mode for received packets. It may + be configured to either discard the outer DS value (the default) + OR to overwrite the inner DS field with the outer DS field. If + + + +Kent & Seo Standards Track [Page 56] + +RFC 4301 Security Architecture for IP December 2005 + + + offered, the discard vs. overwrite behavior MAY be configured on a + per-SA basis. This configuration option allows a local + administrator to decide whether the vulnerabilities created by + copying these bits outweigh the benefits of copying. See + [RFC2983] for further information on when each of these behaviors + may be useful, and also for the possible need for diffserv traffic + conditioning prior or subsequent to IPsec processing (including + tunnel decapsulation). + + o IPsec allows the IP version of the encapsulating header to be + different from that of the inner header. + + The tables in the following sub-sections show the handling for the + different header/option fields ("constructed" means that the value in + the outer field is constructed independently of the value in the + inner). + +5.1.2.1. IPv4: Header Construction for Tunnel Mode + + <-- How Outer Hdr Relates to Inner Hdr --> + Outer Hdr at Inner Hdr at + IPv4 Encapsulator Decapsulator + Header fields: -------------------- ------------ + version 4 (1) no change + header length constructed no change + DS Field copied from inner hdr (5) no change + ECN Field copied from inner hdr constructed (6) + total length constructed no change + ID constructed no change + flags (DF,MF) constructed, DF (4) no change + fragment offset constructed no change + TTL constructed (2) decrement (2) + protocol AH, ESP no change + checksum constructed constructed (2)(6) + src address constructed (3) no change + dest address constructed (3) no change + Options never copied no change + + Notes: + + (1) The IP version in the encapsulating header can be different + from the value in the inner header. + + (2) The TTL in the inner header is decremented by the encapsulator + prior to forwarding and by the decapsulator if it forwards the + packet. (The IPv4 checksum changes when the TTL changes.) + + + + + +Kent & Seo Standards Track [Page 57] + +RFC 4301 Security Architecture for IP December 2005 + + + Note: Decrementing the TTL value is a normal part of + forwarding a packet. Thus, a packet originating from the same + node as the encapsulator does not have its TTL decremented, + since the sending node is originating the packet rather than + forwarding it. This applies to BITS and native IPsec + implementations in hosts and routers. However, the IPsec + processing model includes an external forwarding capability. + TTL processing can be used to prevent looping of packets, + e.g., due to configuration errors, within the context of this + processing model. + + (3) Local and Remote addresses depend on the SA, which is used to + determine the Remote address, which in turn determines which + Local address (net interface) is used to forward the packet. + + Note: For multicast traffic, the destination address, or + source and destination addresses, may be required for + demuxing. In that case, it is important to ensure consistency + over the lifetime of the SA by ensuring that the source + address that appears in the encapsulating tunnel header is the + same as the one that was negotiated during the SA + establishment process. There is an exception to this general + rule, i.e., a mobile IPsec implementation will update its + source address as it moves. + + (4) Configuration determines whether to copy from the inner header + (IPv4 only), clear, or set the DF. + + (5) If the packet will immediately enter a domain for which the + DSCP value in the outer header is not appropriate, that value + MUST be mapped to an appropriate value for the domain + [NiBlBaBL98]. See RFC 2475 [BBCDWW98] for further + information. + + (6) If the ECN field in the inner header is set to ECT(0) or + ECT(1), where ECT is ECN-Capable Transport (ECT), and if the + ECN field in the outer header is set to Congestion Experienced + (CE), then set the ECN field in the inner header to CE; + otherwise, make no change to the ECN field in the inner + header. (The IPv4 checksum changes when the ECN changes.) + + Note: IPsec does not copy the options from the inner header into the + outer header, nor does IPsec construct the options in the outer + header. However, post-IPsec code MAY insert/construct options for + the outer header. + + + + + + +Kent & Seo Standards Track [Page 58] + +RFC 4301 Security Architecture for IP December 2005 + + +5.1.2.2. IPv6: Header Construction for Tunnel Mode + + <-- How Outer Hdr Relates Inner Hdr ---> + Outer Hdr at Inner Hdr at + IPv6 Encapsulator Decapsulator + Header fields: -------------------- ------------ + version 6 (1) no change + DS Field copied from inner hdr (5) no change (9) + ECN Field copied from inner hdr constructed (6) + flow label copied or configured (8) no change + payload length constructed no change + next header AH,ESP,routing hdr no change + hop limit constructed (2) decrement (2) + src address constructed (3) no change + dest address constructed (3) no change + Extension headers never copied (7) no change + + Notes: + + (1) - (6) See Section 5.1.2.1. + + (7) IPsec does not copy the extension headers from the inner + packet into outer headers, nor does IPsec construct extension + headers in the outer header. However, post-IPsec code MAY + insert/construct extension headers for the outer header. + + (8) See [RaCoCaDe04]. Copying is acceptable only for end systems, + not SGs. If an SG copied flow labels from the inner header to + the outer header, collisions might result. + + (9) An implementation MAY choose to provide a facility to pass the + DS value from the outer header to the inner header, on a per- + SA basis, for received tunnel mode packets. The motivation + for providing this feature is to accommodate situations in + which the DS code space at the receiver is different from that + of the sender and the receiver has no way of knowing how to + translate from the sender's space. There is a danger in + copying this value from the outer header to the inner header, + since it enables an attacker to modify the outer DSCP value in + a fashion that may adversely affect other traffic at the + receiver. Hence the default behavior for IPsec + implementations is NOT to permit such copying. + +5.2. Processing Inbound IP Traffic (unprotected-to-protected) + + Inbound processing is somewhat different from outbound processing, + because of the use of SPIs to map IPsec-protected traffic to SAs. + The inbound SPD cache (SPD-I) is applied only to bypassed or + + + +Kent & Seo Standards Track [Page 59] + +RFC 4301 Security Architecture for IP December 2005 + + + discarded traffic. If an arriving packet appears to be an IPsec + fragment from an unprotected interface, reassembly is performed prior + to IPsec processing. The intent for any SPD cache is that a packet + that fails to match any entry is then referred to the corresponding + SPD. Every SPD SHOULD have a nominal, final entry that catches + anything that is otherwise unmatched, and discards it. This ensures + that non-IPsec-protected traffic that arrives and does not match any + SPD-I entry will be discarded. + + Unprotected Interface + | + V + +-----+ IPsec protected + ------------------->|Demux|-------------------+ + | +-----+ | + | | | + | Not IPsec | | + | | | + | V | + | +-------+ +---------+ | + | |DISCARD|<---|SPD-I (*)| | + | +-------+ +---------+ | + | | | + | |-----+ | + | | | | + | | V | + | | +------+ | + | | | ICMP | | + | | +------+ | + | | V + +---------+ | +-----------+ + ....|SPD-O (*)|............|...................|PROCESS(**)|...IPsec + +---------+ | | (AH/ESP) | Boundary + ^ | +-----------+ + | | +---+ | + | BYPASS | +-->|IKE| | + | | | +---+ | + | V | V + | +----------+ +---------+ +----+ + |--------<------|Forwarding|<---------|SAD Check|-->|ICMP| + nested SAs +----------+ | (***) | +----+ + | +---------+ + V + Protected Interface + + Figure 3. Processing Model for Inbound Traffic + + + + + +Kent & Seo Standards Track [Page 60] + +RFC 4301 Security Architecture for IP December 2005 + + + (*) = The caches are shown here. If there is + a cache miss, then the SPD is checked. + There is no requirement that an + implementation buffer the packet if + there is a cache miss. + (**) = This processing includes using the + packet's SPI, etc., to look up the SA + in the SAD, which forms a cache of the + SPD for inbound packets (except for + cases noted in Sections 4.4.2 and 5). + See step 3a below. + (***) = This SAD check refers to step 4 below. + + Prior to performing AH or ESP processing, any IP fragments that + arrive via the unprotected interface are reassembled (by IP). Each + inbound IP datagram to which IPsec processing will be applied is + identified by the appearance of the AH or ESP values in the IP Next + Protocol field (or of AH or ESP as a next layer protocol in the IPv6 + context). + + IPsec MUST perform the following steps: + + 1. When a packet arrives, it may be tagged with the ID of the + interface (physical or virtual) via which it arrived, if + necessary, to support multiple SPDs and associated SPD-I caches. + (The interface ID is mapped to a corresponding SPD-ID.) + + 2. The packet is examined and demuxed into one of two categories: + - If the packet appears to be IPsec protected and it is addressed + to this device, an attempt is made to map it to an active SA + via the SAD. Note that the device may have multiple IP + addresses that may be used in the SAD lookup, e.g., in the case + of protocols such as SCTP. + - Traffic not addressed to this device, or addressed to this + device and not AH or ESP, is directed to SPD-I lookup. (This + implies that IKE traffic MUST have an explicit BYPASS entry in + the SPD.) If multiple SPDs are employed, the tag assigned to + the packet in step 1 is used to select the appropriate SPD-I + (and cache) to search. SPD-I lookup determines whether the + action is DISCARD or BYPASS. + + 3a. If the packet is addressed to the IPsec device and AH or ESP is + specified as the protocol, the packet is looked up in the SAD. + For unicast traffic, use only the SPI (or SPI plus protocol). + For multicast traffic, use the SPI plus the destination or SPI + plus destination and source addresses, as specified in Section + 4.1. In either case (unicast or multicast), if there is no match, + discard the traffic. This is an auditable event. The audit log + + + +Kent & Seo Standards Track [Page 61] + +RFC 4301 Security Architecture for IP December 2005 + + + entry for this event SHOULD include the current date/time, SPI, + source and destination of the packet, IPsec protocol, and any + other selector values of the packet that are available. If the + packet is found in the SAD, process it accordingly (see step 4). + + 3b. If the packet is not addressed to the device or is addressed to + this device and is not AH or ESP, look up the packet header in + the (appropriate) SPD-I cache. If there is a match and the + packet is to be discarded or bypassed, do so. If there is no + cache match, look up the packet in the corresponding SPD-I and + create a cache entry as appropriate. (No SAs are created in + response to receipt of a packet that requires IPsec protection; + only BYPASS or DISCARD cache entries can be created this way.) If + there is no match, discard the traffic. This is an auditable + event. The audit log entry for this event SHOULD include the + current date/time, SPI if available, IPsec protocol if available, + source and destination of the packet, and any other selector + values of the packet that are available. + + 3c. Processing of ICMP messages is assumed to take place on the + unprotected side of the IPsec boundary. Unprotected ICMP + messages are examined and local policy is applied to determine + whether to accept or reject these messages and, if accepted, what + action to take as a result. For example, if an ICMP unreachable + message is received, the implementation must decide whether to + act on it, reject it, or act on it with constraints. (See Section + 6.) + + 4. Apply AH or ESP processing as specified, using the SAD entry + selected in step 3a above. Then match the packet against the + inbound selectors identified by the SAD entry to verify that the + received packet is appropriate for the SA via which it was + received. + + 5. If an IPsec system receives an inbound packet on an SA and the + packet's header fields are not consistent with the selectors for + the SA, it MUST discard the packet. This is an auditable event. + The audit log entry for this event SHOULD include the current + date/time, SPI, IPsec protocol(s), source and destination of the + packet, any other selector values of the packet that are + available, and the selector values from the relevant SAD entry. + The system SHOULD also be capable of generating and sending an + IKE notification of INVALID_SELECTORS to the sender (IPsec peer), + indicating that the received packet was discarded because of + failure to pass selector checks. + + + + + + +Kent & Seo Standards Track [Page 62] + +RFC 4301 Security Architecture for IP December 2005 + + + To minimize the impact of a DoS attack, or a mis-configured peer, the + IPsec system SHOULD include a management control to allow an + administrator to configure the IPsec implementation to send or not + send this IKE notification, and if this facility is selected, to rate + limit the transmission of such notifications. + + After traffic is bypassed or processed through IPsec, it is handed to + the inbound forwarding function for disposition. This function may + cause the packet to be sent (outbound) across the IPsec boundary for + additional inbound IPsec processing, e.g., in support of nested SAs. + If so, then as with ALL outbound traffic that is to be bypassed, the + packet MUST be matched against an SPD-O entry. Ultimately, the + packet should be forwarded to the destination host or process for + disposition. + +6. ICMP Processing + + This section describes IPsec handling of ICMP traffic. There are two + categories of ICMP traffic: error messages (e.g., type = destination + unreachable) and non-error messages (e.g., type = echo). This + section applies exclusively to error messages. Disposition of + non-error, ICMP messages (that are not addressed to the IPsec + implementation itself) MUST be explicitly accounted for using SPD + entries. + + The discussion in this section applies to ICMPv6 as well as to + ICMPv4. Also, a mechanism SHOULD be provided to allow an + administrator to cause ICMP error messages (selected, all, or none) + to be logged as an aid to problem diagnosis. + +6.1. Processing ICMP Error Messages Directed to an IPsec Implementation + +6.1.1. ICMP Error Messages Received on the Unprotected Side of the + Boundary + + Figure 3 in Section 5.2 shows a distinct ICMP processing module on + the unprotected side of the IPsec boundary, for processing ICMP + messages (error or otherwise) that are addressed to the IPsec device + and that are not protected via AH or ESP. An ICMP message of this + sort is unauthenticated, and its processing may result in denial or + degradation of service. This suggests that, in general, it would be + desirable to ignore such messages. However, many ICMP messages will + be received by hosts or security gateways from unauthenticated + sources, e.g., routers in the public Internet. Ignoring these ICMP + messages can degrade service, e.g., because of a failure to process + PMTU message and redirection messages. Thus, there is also a + motivation for accepting and acting upon unauthenticated ICMP + messages. + + + +Kent & Seo Standards Track [Page 63] + +RFC 4301 Security Architecture for IP December 2005 + + + To accommodate both ends of this spectrum, a compliant IPsec + implementation MUST permit a local administrator to configure an + IPsec implementation to accept or reject unauthenticated ICMP + traffic. This control MUST be at the granularity of ICMP type and + MAY be at the granularity of ICMP type and code. Additionally, an + implementation SHOULD incorporate mechanisms and parameters for + dealing with such traffic. For example, there could be the ability + to establish a minimum PMTU for traffic (on a per destination basis), + to prevent receipt of an unauthenticated ICMP from setting the PMTU + to a trivial size. + + If an ICMP PMTU message passes the checks above and the system is + configured to accept it, then there are two possibilities. If the + implementation applies fragmentation on the ciphertext side of the + boundary, then the accepted PMTU information is passed to the + forwarding module (outside of the IPsec implementation), which uses + it to manage outbound packet fragmentation. If the implementation is + configured to effect plaintext side fragmentation, then the PMTU + information is passed to the plaintext side and processed as + described in Section 8.2. + +6.1.2. ICMP Error Messages Received on the Protected Side of the + Boundary + + These ICMP messages are not authenticated, but they do come from + sources on the protected side of the IPsec boundary. Thus, these + messages generally are viewed as more "trustworthy" than their + counterparts arriving from sources on the unprotected side of the + boundary. The major security concern here is that a compromised host + or router might emit erroneous ICMP error messages that could degrade + service for other devices "behind" the security gateway, or that + could even result in violations of confidentiality. For example, if + a bogus ICMP redirect were consumed by a security gateway, it could + cause the forwarding table on the protected side of the boundary to + be modified so as to deliver traffic to an inappropriate destination + "behind" the gateway. Thus, implementers MUST provide controls to + allow local administrators to constrain the processing of ICMP error + messages received on the protected side of the boundary, and directed + to the IPsec implementation. These controls are of the same type as + those employed on the unprotected side, described above in Section + 6.1.1. + +6.2. Processing Protected, Transit ICMP Error Messages + + When an ICMP error message is transmitted via an SA to a device + "behind" an IPsec implementation, both the payload and the header of + the ICMP message require checking from an access control perspective. + If one of these messages is forwarded to a host behind a security + + + +Kent & Seo Standards Track [Page 64] + +RFC 4301 Security Architecture for IP December 2005 + + + gateway, the receiving host IP implementation will make decisions + based on the payload, i.e., the header of the packet that purportedly + triggered the error response. Thus, an IPsec implementation MUST be + configurable to check that this payload header information is + consistent with the SA via which it arrives. (This means that the + payload header, with source and destination address and port fields + reversed, matches the traffic selectors for the SA.) If this sort of + check is not performed, then, for example, anyone with whom the + receiving IPsec system (A) has an active SA could send an ICMP + Destination Unreachable message that refers to any host/net with + which A is currently communicating, and thus effect a highly + efficient DoS attack regarding communication with other peers of A. + Normal IPsec receiver processing of traffic is not sufficient to + protect against such attacks. However, not all contexts may require + such checks, so it is also necessary to allow a local administrator + to configure an implementation to NOT perform such checks. + + To accommodate both policies, the following convention is adopted. + If an administrator wants to allow ICMP error messages to be carried + by an SA without inspection of the payload, then configure an SPD + entry that explicitly allows for carriage of such traffic. If an + administrator wants IPsec to check the payload of ICMP error messages + for consistency, then do not create any SPD entries that accommodate + carriage of such traffic based on the ICMP packet header. This + convention motivates the following processing description. + + IPsec senders and receivers MUST support the following processing for + ICMP error messages that are sent and received via SAs. + + If an SA exists that accommodates an outbound ICMP error message, + then the message is mapped to the SA and only the IP and ICMP headers + are checked upon receipt, just as would be the case for other + traffic. If no SA exists that matches the traffic selectors + associated with an ICMP error message, then the SPD is searched to + determine if such an SA can be created. If so, the SA is created and + the ICMP error message is transmitted via that SA. Upon receipt, + this message is subject to the usual traffic selector checks at the + receiver. This processing is exactly what would happen for traffic + in general, and thus does not represent any special processing for + ICMP error messages. + + If no SA exists that would carry the outbound ICMP message in + question, and if no SPD entry would allow carriage of this outbound + ICMP error message, then an IPsec implementation MUST map the message + to the SA that would carry the return traffic associated with the + packet that triggered the ICMP error message. This requires an IPsec + implementation to detect outbound ICMP error messages that map to no + extant SA or SPD entry, and treat them specially with regard to SA + + + +Kent & Seo Standards Track [Page 65] + +RFC 4301 Security Architecture for IP December 2005 + + + creation and lookup. The implementation extracts the header for the + packet that triggered the error (from the ICMP message payload), + reverses the source and destination IP address fields, extracts the + protocol field, and reverses the port fields (if accessible). It + then uses this extracted information to locate an appropriate, active + outbound SA, and transmits the error message via this SA. If no such + SA exists, no SA will be created, and this is an auditable event. + + If an IPsec implementation receives an inbound ICMP error message on + an SA, and the IP and ICMP headers of the message do not match the + traffic selectors for the SA, the receiver MUST process the received + message in a special fashion. Specifically, the receiver must + extract the header of the triggering packet from the ICMP payload, + and reverse fields as described above to determine if the packet is + consistent with the selectors for the SA via which the ICMP error + message was received. If the packet fails this check, the IPsec + implementation MUST NOT forwarded the ICMP message to the + destination. This is an auditable event. + +7. Handling Fragments (on the protected side of the IPsec boundary) + + Earlier sections of this document describe mechanisms for (a) + fragmenting an outbound packet after IPsec processing has been + applied and reassembling it at the receiver before IPsec processing + and (b) handling inbound fragments received from the unprotected side + of the IPsec boundary. This section describes how an implementation + should handle the processing of outbound plaintext fragments on the + protected side of the IPsec boundary. (See Appendix D, "Fragment + Handling Rationale".) In particular, it addresses: + + o mapping an outbound non-initial fragment to the right SA + (or finding the right SPD entry) + o verifying that a received non-initial fragment is + authorized for the SA via which it was received + o mapping outbound and inbound non-initial fragments to the + right SPD-O/SPD-I entry or the relevant cache entry, for + BYPASS/DISCARD traffic + + Note: In Section 4.1, transport mode SAs have been defined to not + carry fragments (IPv4 or IPv6). Note also that in Section 4.4.1, two + special values, ANY and OPAQUE, were defined for selectors and that + ANY includes OPAQUE. The term "non-trivial" is used to mean that the + selector has a value other than OPAQUE or ANY. + + Note: The term "non-initial fragment" is used here to indicate a + fragment that does not contain all the selector values that may be + needed for access control. As observed in Section 4.4.1, depending + on the Next Layer Protocol, in addition to Ports, the ICMP message + + + +Kent & Seo Standards Track [Page 66] + +RFC 4301 Security Architecture for IP December 2005 + + + type/code or Mobility Header type could be missing from non-initial + fragments. Also, for IPv6, even the first fragment might NOT contain + the Next Layer Protocol or Ports (or ICMP message type/code, or + Mobility Header type) depending on the kind and number of extension + headers present. If a non-initial fragment contains the Port (or + ICMP type and code or Mobility Header type) but not the Next Layer + Protocol, then unless there is an SPD entry for the relevant + Local/Remote addresses with ANY for Next Layer Protocol and Port (or + ICMP type and code or Mobility Header type), the fragment would not + contain all the selector information needed for access control. + + To address the above issues, three approaches have been defined: + + o Tunnel mode SAs that carry initial and non-initial fragments + (See Section 7.1.) + o Separate tunnel mode SAs for non-initial fragments (See + Section 7.2.) + o Stateful fragment checking (See Section 7.3.) + +7.1. Tunnel Mode SAs that Carry Initial and Non-Initial Fragments + + All implementations MUST support tunnel mode SAs that are configured + to pass traffic without regard to port field (or ICMP type/code or + Mobility Header type) values. If the SA will carry traffic for + specified protocols, the selector set for the SA MUST specify the + port fields (or ICMP type/code or Mobility Header type) as ANY. An + SA defined in this fashion will carry all traffic including initial + and non-initial fragments for the indicated Local/Remote addresses + and specified Next Layer protocol(s). If the SA will carry traffic + without regard to a specific protocol value (i.e., ANY is specified + as the (Next Layer) protocol selector value), then the port field + values are undefined and MUST be set to ANY as well. (As noted in + 4.4.1, ANY includes OPAQUE as well as all specific values.) + +7.2. Separate Tunnel Mode SAs for Non-Initial Fragments + + An implementation MAY support tunnel mode SAs that will carry only + non-initial fragments, separate from non-fragmented packets and + initial fragments. The OPAQUE value will be used to specify port (or + ICMP type/code or Mobility Header type) field selectors for an SA to + carry such fragments. Receivers MUST perform a minimum offset check + on IPv4 (non-initial) fragments to protect against overlapping + fragment attacks when SAs of this type are employed. Because such + checks cannot be performed on IPv6 non-initial fragments, users and + administrators are advised that carriage of such fragments may be + dangerous, and implementers may choose to NOT support such SAs for + IPv6 traffic. Also, an SA of this sort will carry all non-initial + fragments that match a specified Local/Remote address pair and + + + +Kent & Seo Standards Track [Page 67] + +RFC 4301 Security Architecture for IP December 2005 + + + protocol value, i.e., the fragments carried on this SA belong to + packets that if not fragmented, might have gone on separate SAs of + differing security. Therefore, users and administrators are advised + to protect such traffic using ESP (with integrity) and the + "strongest" integrity and encryption algorithms in use between both + peers. (Determination of the "strongest" algorithms requires + imposing an ordering of the available algorithms, a local + determination at the discretion of the initiator of the SA.) + + Specific port (or ICMP type/code or Mobility Header type) selector + values will be used to define SAs to carry initial fragments and + non-fragmented packets. This approach can be used if a user or + administrator wants to create one or more tunnel mode SAs between the + same Local/Remote addresses that discriminate based on port (or ICMP + type/code or Mobility Header type) fields. These SAs MUST have + non-trivial protocol selector values, otherwise approach #1 above + MUST be used. + + Note: In general, for the approach described in this section, one + needs only a single SA between two implementations to carry all + non-initial fragments. However, if one chooses to have multiple SAs + between the two implementations for QoS differentiation, then one + might also want multiple SAs to carry fragments-without-ports, one + for each supported QoS class. Since support for QoS via distinct SAs + is a local matter, not mandated by this document, the choice to have + multiple SAs to carry non-initial fragments should also be local. + +7.3. Stateful Fragment Checking + + An implementation MAY support some form of stateful fragment checking + for a tunnel mode SA with non-trivial port (or ICMP type/code or MH + type) field values (not ANY or OPAQUE). Implementations that will + transmit non-initial fragments on a tunnel mode SA that makes use of + non-trivial port (or ICMP type/code or MH type) selectors MUST notify + a peer via the IKE NOTIFY NON_FIRST_FRAGMENTS_ALSO payload. + + The peer MUST reject this proposal if it will not accept non-initial + fragments in this context. If an implementation does not + successfully negotiate transmission of non-initial fragments for such + an SA, it MUST NOT send such fragments over the SA. This standard + does not specify how peers will deal with such fragments, e.g., via + reassembly or other means, at either sender or receiver. However, a + receiver MUST discard non-initial fragments that arrive on an SA with + non-trivial port (or ICMP type/code or MH type) selector values + unless this feature has been negotiated. Also, the receiver MUST + discard non-initial fragments that do not comply with the security + policy applied to the overall packet. Discarding such packets is an + auditable event. Note that in network configurations where fragments + + + +Kent & Seo Standards Track [Page 68] + +RFC 4301 Security Architecture for IP December 2005 + + + of a packet might be sent or received via different security gateways + or BITW implementations, stateful strategies for tracking fragments + may fail. + +7.4. BYPASS/DISCARD Traffic + + All implementations MUST support DISCARDing of fragments using the + normal SPD packet classification mechanisms. All implementations + MUST support stateful fragment checking to accommodate BYPASS traffic + for which a non-trivial port range is specified. The concern is that + BYPASS of a cleartext, non-initial fragment arriving at an IPsec + implementation could undermine the security afforded IPsec-protected + traffic directed to the same destination. For example, consider an + IPsec implementation configured with an SPD entry that calls for + IPsec protection of traffic between a specific source/destination + address pair, and for a specific protocol and destination port, e.g., + TCP traffic on port 23 (Telnet). Assume that the implementation also + allows BYPASS of traffic from the same source/destination address + pair and protocol, but for a different destination port, e.g., port + 119 (NNTP). An attacker could send a non-initial fragment (with a + forged source address) that, if bypassed, could overlap with + IPsec-protected traffic from the same source and thus violate the + integrity of the IPsec-protected traffic. Requiring stateful + fragment checking for BYPASS entries with non-trivial port ranges + prevents attacks of this sort. As noted above, in network + configurations where fragments of a packet might be sent or received + via different security gateways or BITW implementations, stateful + strategies for tracking fragments may fail. + +8. Path MTU/DF Processing + + The application of AH or ESP to an outbound packet increases the size + of a packet and thus may cause a packet to exceed the PMTU for the SA + via which the packet will travel. An IPsec implementation also may + receive an unprotected ICMP PMTU message and, if it chooses to act + upon the message, the result will affect outbound traffic processing. + This section describes the processing required of an IPsec + implementation to deal with these two PMTU issues. + +8.1. DF Bit + + All IPsec implementations MUST support the option of copying the DF + bit from an outbound packet to the tunnel mode header that it emits, + when traffic is carried via a tunnel mode SA. This means that it + MUST be possible to configure the implementation's treatment of the + DF bit (set, clear, copy from inner header) for each SA. This + applies to SAs where both inner and outer headers are IPv4. + + + + +Kent & Seo Standards Track [Page 69] + +RFC 4301 Security Architecture for IP December 2005 + + +8.2. Path MTU (PMTU) Discovery + + This section discusses IPsec handling for unprotected Path MTU + Discovery messages. ICMP PMTU is used here to refer to an ICMP + message for: + + IPv4 (RFC 792 [Pos81b]): + - Type = 3 (Destination Unreachable) + - Code = 4 (Fragmentation needed and DF set) + - Next-Hop MTU in the low-order 16 bits of the + second word of the ICMP header (labeled "unused" + in RFC 792), with high-order 16 bits set to zero) + + IPv6 (RFC 2463 [CD98]): + - Type = 2 (Packet Too Big) + - Code = 0 (Fragmentation needed) + - Next-Hop MTU in the 32-bit MTU field of the ICMP6 + message + +8.2.1. Propagation of PMTU + + When an IPsec implementation receives an unauthenticated PMTU + message, and it is configured to process (vs. ignore) such messages, + it maps the message to the SA to which it corresponds. This mapping + is effected by extracting the header information from the payload of + the PMTU message and applying the procedure described in Section 5.2. + The PMTU determined by this message is used to update the SAD PMTU + field, taking into account the size of the AH or ESP header that will + be applied, any crypto synchronization data, and the overhead imposed + by an additional IP header, in the case of a tunnel mode SA. + + In a native host implementation, it is possible to maintain PMTU data + at the same granularity as for unprotected communication, so there is + no loss of functionality. Signaling of the PMTU information is + internal to the host. For all other IPsec implementation options, + the PMTU data must be propagated via a synthesized ICMP PMTU. In + these cases, the IPsec implementation SHOULD wait for outbound + traffic to be mapped to the SAD entry. When such traffic arrives, if + the traffic would exceed the updated PMTU value the traffic MUST be + handled as follows: + + Case 1: Original (cleartext) packet is IPv4 and has the DF + bit set. The implementation SHOULD discard the packet + and send a PMTU ICMP message. + + + + + + + +Kent & Seo Standards Track [Page 70] + +RFC 4301 Security Architecture for IP December 2005 + + + Case 2: Original (cleartext) packet is IPv4 and has the DF + bit clear. The implementation SHOULD fragment (before or + after encryption per its configuration) and then forward + the fragments. It SHOULD NOT send a PMTU ICMP message. + + Case 3: Original (cleartext) packet is IPv6. The implementation + SHOULD discard the packet and send a PMTU ICMP message. + +8.2.2. PMTU Aging + + In all IPsec implementations, the PMTU associated with an SA MUST be + "aged" and some mechanism is required to update the PMTU in a timely + manner, especially for discovering if the PMTU is smaller than + required by current network conditions. A given PMTU has to remain + in place long enough for a packet to get from the source of the SA to + the peer, and to propagate an ICMP error message if the current PMTU + is too big. + + Implementations SHOULD use the approach described in the Path MTU + Discovery document (RFC 1191 [MD90], Section 6.3), which suggests + periodically resetting the PMTU to the first-hop data-link MTU and + then letting the normal PMTU Discovery processes update the PMTU as + necessary. The period SHOULD be configurable. + +9. Auditing + + IPsec implementations are not required to support auditing. For the + most part, the granularity of auditing is a local matter. However, + several auditable events are identified in this document, and for + each of these events a minimum set of information that SHOULD be + included in an audit log is defined. Additional information also MAY + be included in the audit log for each of these events, and additional + events, not explicitly called out in this specification, also MAY + result in audit log entries. There is no requirement for the + receiver to transmit any message to the purported transmitter in + response to the detection of an auditable event, because of the + potential to induce denial of service via such action. + +10. Conformance Requirements + + All IPv4 IPsec implementations MUST comply with all requirements of + this document. All IPv6 implementations MUST comply with all + requirements of this document. + + + + + + + + +Kent & Seo Standards Track [Page 71] + +RFC 4301 Security Architecture for IP December 2005 + + +11. Security Considerations + + The focus of this document is security; hence security considerations + permeate this specification. + + IPsec imposes stringent constraints on bypass of IP header data in + both directions, across the IPsec barrier, especially when tunnel + mode SAs are employed. Some constraints are absolute, while others + are subject to local administrative controls, often on a per-SA + basis. For outbound traffic, these constraints are designed to limit + covert channel bandwidth. For inbound traffic, the constraints are + designed to prevent an adversary who has the ability to tamper with + one data stream (on the unprotected side of the IPsec barrier) from + adversely affecting other data streams (on the protected side of the + barrier). The discussion in Section 5 dealing with processing DSCP + values for tunnel mode SAs illustrates this concern. + + If an IPsec implementation is configured to pass ICMP error messages + over SAs based on the ICMP header values, without checking the header + information from the ICMP message payload, serious vulnerabilities + may arise. Consider a scenario in which several sites (A, B, and C) + are connected to one another via ESP-protected tunnels: A-B, A-C, and + B-C. Also assume that the traffic selectors for each tunnel specify + ANY for protocol and port fields and IP source/destination address + ranges that encompass the address range for the systems behind the + security gateways serving each site. This would allow a host at site + B to send an ICMP Destination Unreachable message to any host at site + A, that declares all hosts on the net at site C to be unreachable. + This is a very efficient DoS attack that could have been prevented if + the ICMP error messages were subjected to the checks that IPsec + provides, if the SPD is suitably configured, as described in Section + 6.2. + +12. IANA Considerations + + The IANA has assigned the value (3) for the asn1-modules registry and + has assigned the object identifier 1.3.6.1.5.8.3.1 for the SPD + module. See Appendix C, "ASN.1 for an SPD Entry". + +13. Differences from RFC 2401 + + This architecture document differs substantially from RFC 2401 + [RFC2401] in detail and in organization, but the fundamental notions + are unchanged. + + o The processing model has been revised to address new IPsec + scenarios, improve performance, and simplify implementation. This + includes a separation between forwarding (routing) and SPD + + + +Kent & Seo Standards Track [Page 72] + +RFC 4301 Security Architecture for IP December 2005 + + + selection, several SPD changes, and the addition of an outbound SPD + cache and an inbound SPD cache for bypassed or discarded traffic. + There is also a new database, the Peer Authorization Database + (PAD). This provides a link between an SA management protocol + (such as IKE) and the SPD. + + o There is no longer a requirement to support nested SAs or "SA + bundles". Instead this functionality can be achieved through SPD + and forwarding table configuration. An example of a configuration + has been added in Appendix E. + + o SPD entries were redefined to provide more flexibility. Each SPD + entry now consists of 1 to N sets of selectors, where each selector + set contains one protocol and a "list of ranges" can now be + specified for the Local IP address, Remote IP address, and whatever + fields (if any) are associated with the Next Layer Protocol (Local + Port, Remote Port, ICMP message type and code, and Mobility Header + type). An individual value for a selector is represented via a + trivial range and ANY is represented via a range than spans all + values for the selector. An example of an ASN.1 description is + included in Appendix C. + + o TOS (IPv4) and Traffic Class (IPv6) have been replaced by DSCP and + ECN. The tunnel section has been updated to explain how to handle + DSCP and ECN bits. + + o For tunnel mode SAs, an SG, BITS, or BITW implementation is now + allowed to fragment packets before applying IPsec. This applies + only to IPv4. For IPv6 packets, only the originator is allowed to + fragment them. + + o When security is desired between two intermediate systems along a + path or between an intermediate system and an end system, transport + mode may now be used between security gateways and between a + security gateway and a host. + + o This document clarifies that for all traffic that crosses the IPsec + boundary, including IPsec management traffic, the SPD or associated + caches must be consulted. + + o This document defines how to handle the situation of a security + gateway with multiple subscribers requiring separate IPsec + contexts. + + o A definition of reserved SPIs has been added. + + + + + + +Kent & Seo Standards Track [Page 73] + +RFC 4301 Security Architecture for IP December 2005 + + + o Text has been added explaining why ALL IP packets must be checked + -- IPsec includes minimal firewall functionality to support access + control at the IP layer. + + o The tunnel section has been updated to clarify how to handle the IP + options field and IPv6 extension headers when constructing the + outer header. + + o SA mapping for inbound traffic has been updated to be consistent + with the changes made in AH and ESP for support of unicast and + multicast SAs. + + o Guidance has been added regarding how to handle the covert channel + created in tunnel mode by copying the DSCP value to outer header. + + o Support for AH in both IPv4 and IPv6 is no longer required. + + o PMTU handling has been updated. The appendix on + PMTU/DF/Fragmentation has been deleted. + + o Three approaches have been added for handling plaintext fragments + on the protected side of the IPsec boundary. Appendix D documents + the rationale behind them. + + o Added revised text describing how to derive selector values for SAs + (from the SPD entry or from the packet, etc.) + + o Added a new table describing the relationship between selector + values in an SPD entry, the PFP flag, and resulting selector values + in the corresponding SAD entry. + + o Added Appendix B to describe decorrelation. + + o Added text describing how to handle an outbound packet that must be + discarded. + + o Added text describing how to handle a DISCARDED inbound packet, + i.e., one that does not match the SA upon which it arrived. + + o IPv6 mobility header has been added as a possible Next Layer + Protocol. IPv6 Mobility Header message type has been added as a + selector. + + o ICMP message type and code have been added as selectors. + + o The selector "data sensitivity level" has been removed to simplify + things. + + + + +Kent & Seo Standards Track [Page 74] + +RFC 4301 Security Architecture for IP December 2005 + + + o Updated text describing handling ICMP error messages. The appendix + on "Categorization of ICMP Messages" has been deleted. + + o The text for the selector name has been updated and clarified. + + o The "Next Layer Protocol" has been further explained and a default + list of protocols to skip when looking for the Next Layer Protocol + has been added. + + o The text has been amended to say that this document assumes use of + IKEv2 or an SA management protocol with comparable features. + + o Text has been added clarifying the algorithm for mapping inbound + IPsec datagrams to SAs in the presence of multicast SAs. + + o The appendix "Sequence Space Window Code Example" has been removed. + + o With respect to IP addresses and ports, the terms "Local" and + "Remote" are used for policy rules (replacing source and + destination). "Local" refers to the entity being protected by an + IPsec implementation, i.e., the "source" address/port of outbound + packets or the "destination" address/port of inbound packets. + "Remote" refers to a peer entity or peer entities. The terms + "source" and "destination" are still used for packet header fields. + +14. Acknowledgements + + The authors would like to acknowledge the contributions of Ran + Atkinson, who played a critical role in initial IPsec activities, and + who authored the first series of IPsec standards: RFCs 1825-1827; and + Charlie Lynn, who made significant contributions to the second series + of IPsec standards (RFCs 2401, 2402, and 2406) and to the current + versions, especially with regard to IPv6 issues. The authors also + would like to thank the members of the IPsec and MSEC working groups + who have contributed to the development of this protocol + specification. + + + + + + + + + + + + + + + +Kent & Seo Standards Track [Page 75] + +RFC 4301 Security Architecture for IP December 2005 + + +Appendix A: Glossary + + This section provides definitions for several key terms that are + employed in this document. Other documents provide additional + definitions and background information relevant to this technology, + e.g., [Shi00], [VK83], and [HA94]. Included in this glossary are + generic security service and security mechanism terms, plus + IPsec-specific terms. + + Access Control + A security service that prevents unauthorized use of a resource, + including the prevention of use of a resource in an unauthorized + manner. In the IPsec context, the resource to which access is + being controlled is often: + + o for a host, computing cycles or data + o for a security gateway, a network behind the gateway + or bandwidth on that network. + + Anti-replay + See "Integrity" below. + + Authentication + Used informally to refer to the combination of two nominally + distinct security services, data origin authentication and + connectionless integrity. See the definitions below for each of + these services. + + Availability + When viewed as a security service, addresses the security concerns + engendered by attacks against networks that deny or degrade + service. For example, in the IPsec context, the use of + anti-replay mechanisms in AH and ESP support availability. + + Confidentiality + The security service that protects data from unauthorized + disclosure. The primary confidentiality concern in most instances + is unauthorized disclosure of application-level data, but + disclosure of the external characteristics of communication also + can be a concern in some circumstances. Traffic flow + confidentiality is the service that addresses this latter concern + by concealing source and destination addresses, message length, or + frequency of communication. In the IPsec context, using ESP in + tunnel mode, especially at a security gateway, can provide some + level of traffic flow confidentiality. (See also "Traffic + Analysis" below.) + + + + + +Kent & Seo Standards Track [Page 76] + +RFC 4301 Security Architecture for IP December 2005 + + + Data Origin Authentication + A security service that verifies the identity of the claimed + source of data. This service is usually bundled with + connectionless integrity service. + + Encryption + A security mechanism used to transform data from an intelligible + form (plaintext) into an unintelligible form (ciphertext), to + provide confidentiality. The inverse transformation process is + designated "decryption". Often the term "encryption" is used to + generically refer to both processes. + + Integrity + A security service that ensures that modifications to data are + detectable. Integrity comes in various flavors to match + application requirements. IPsec supports two forms of integrity: + connectionless and a form of partial sequence integrity. + Connectionless integrity is a service that detects modification of + an individual IP datagram, without regard to the ordering of the + datagram in a stream of traffic. The form of partial sequence + integrity offered in IPsec is referred to as anti-replay + integrity, and it detects arrival of duplicate IP datagrams + (within a constrained window). This is in contrast to + connection-oriented integrity, which imposes more stringent + sequencing requirements on traffic, e.g., to be able to detect + lost or re-ordered messages. Although authentication and + integrity services often are cited separately, in practice they + are intimately connected and almost always offered in tandem. + + Protected vs. Unprotected + "Protected" refers to the systems or interfaces that are inside + the IPsec protection boundary, and "unprotected" refers to the + systems or interfaces that are outside the IPsec protection + boundary. IPsec provides a boundary through which traffic passes. + There is an asymmetry to this barrier, which is reflected in the + processing model. Outbound data, if not discarded or bypassed, is + protected via the application of AH or ESP and the addition of the + corresponding headers. Inbound data, if not discarded or + bypassed, is processed via the removal of AH or ESP headers. In + this document, inbound traffic enters an IPsec implementation from + the "unprotected" interface. Outbound traffic enters the + implementation via the "protected" interface, or is internally + generated by the implementation on the "protected" side of the + boundary and directed toward the "unprotected" interface. An + IPsec implementation may support more than one interface on either + or both sides of the boundary. The protected interface may be + + + + + +Kent & Seo Standards Track [Page 77] + +RFC 4301 Security Architecture for IP December 2005 + + + internal, e.g., in a host implementation of IPsec. The protected + interface may link to a socket layer interface presented by the + OS. + + Security Association (SA) + A simplex (uni-directional) logical connection, created for + security purposes. All traffic traversing an SA is provided the + same security processing. In IPsec, an SA is an Internet-layer + abstraction implemented through the use of AH or ESP. State data + associated with an SA is represented in the SA Database (SAD). + + Security Gateway + An intermediate system that acts as the communications interface + between two networks. The set of hosts (and networks) on the + external side of the security gateway is termed unprotected (they + are generally at least less protected than those "behind" the SG), + while the networks and hosts on the internal side are viewed as + protected. The internal subnets and hosts served by a security + gateway are presumed to be trusted by virtue of sharing a common, + local, security administration. In the IPsec context, a security + gateway is a point at which AH and/or ESP is implemented in order + to serve a set of internal hosts, providing security services for + these hosts when they communicate with external hosts also + employing IPsec (either directly or via another security gateway). + + Security Parameters Index (SPI) + An arbitrary 32-bit value that is used by a receiver to identify + the SA to which an incoming packet should be bound. For a unicast + SA, the SPI can be used by itself to specify an SA, or it may be + used in conjunction with the IPsec protocol type. Additional IP + address information is used to identify multicast SAs. The SPI is + carried in AH and ESP protocols to enable the receiving system to + select the SA under which a received packet will be processed. An + SPI has only local significance, as defined by the creator of the + SA (usually the receiver of the packet carrying the SPI); thus an + SPI is generally viewed as an opaque bit string. However, the + creator of an SA may choose to interpret the bits in an SPI to + facilitate local processing. + + Traffic Analysis + The analysis of network traffic flow for the purpose of deducing + information that is useful to an adversary. Examples of such + information are frequency of transmission, the identities of the + conversing parties, sizes of packets, and flow identifiers + [Sch94]. + + + + + + +Kent & Seo Standards Track [Page 78] + +RFC 4301 Security Architecture for IP December 2005 + + +Appendix B: Decorrelation + + This appendix is based on work done for caching of policies in the IP + Security Policy Working Group by Luis Sanchez, Matt Condell, and John + Zao. + + Two SPD entries are correlated if there is a non-null intersection + between the values of corresponding selectors in each entry. Caching + correlated SPD entries can lead to incorrect policy enforcement. A + solution to this problem, which still allows for caching, is to + remove the ambiguities by decorrelating the entries. That is, the + SPD entries must be rewritten so that for every pair of entries there + exists a selector for which there is a null intersection between the + values in both of the entries. Once the entries are decorrelated, + there is no longer any ordering requirement on them, since only one + entry will match any lookup. The next section describes + decorrelation in more detail and presents an algorithm that may be + used to implement decorrelation. + +B.1. Decorrelation Algorithm + + The basic decorrelation algorithm takes each entry in a correlated + SPD and divides it into a set of entries using a tree structure. + The nodes of the tree are the selectors that may overlap between the + policies. At each node, the algorithm creates a branch for each of + the values of the selector. It also creates one branch for the + complement of the union of all selector values. Policies are then + formed by traversing the tree from the root to each leaf. The + policies at the leaves are compared to the set of already + decorrelated policy rules. Each policy at a leaf is either + completely overridden by a policy in the already decorrelated set and + is discarded or is decorrelated with all the policies in the + decorrelated set and is added to it. + + The basic algorithm does not guarantee an optimal set of decorrelated + entries. That is, the entries may be broken up into smaller sets + than is necessary, though they will still provide all the necessary + policy information. Some extensions to the basic algorithm are + described later to improve this and improve the performance of the + algorithm. + + C A set of ordered, correlated entries (a correlated SPD). + Ci The ith entry in C. + U The set of decorrelated entries being built from C. + Ui The ith entry in U. + Sik The kth selection for policy Ci. + Ai The action for policy Ci. + + + + +Kent & Seo Standards Track [Page 79] + +RFC 4301 Security Architecture for IP December 2005 + + + A policy (SPD entry) P may be expressed as a sequence of selector + values and an action (BYPASS, DISCARD, or PROTECT): + + Ci = Si1 x Si2 x ... x Sik -> Ai + + 1) Put C1 in set U as U1 + + For each policy Cj (j > 1) in C + + 2) If Cj is decorrelated with every entry in U, then add it to U. + + 3) If Cj is correlated with one or more entries in U, create a tree + rooted at the policy Cj that partitions Cj into a set of decorrelated + entries. The algorithm starts with a root node where no selectors + have yet been chosen. + + A) Choose a selector in Cj, Sjn, that has not yet been chosen when + traversing the tree from the root to this node. If there are no + selectors not yet used, continue to the next unfinished branch + until all branches have been completed. When the tree is + completed, go to step D. + + T is the set of entries in U that are correlated with the entry + at this node. + + The entry at this node is the entry formed by the selector + values of each of the branches between the root and this node. + Any selector values that are not yet represented by branches + assume the corresponding selector value in Cj, since the values + in Cj represent the maximum value for each selector. + + B) Add a branch to the tree for each value of the selector Sjn that + appears in any of the entries in T. (If the value is a superset + of the value of Sjn in Cj, then use the value in Cj, since that + value represents the universal set.) Also add a branch for the + complement of the union of all the values of the selector Sjn + in T. When taking the complement, remember that the universal + set is the value of Sjn in Cj. A branch need not be created + for the null set. + + C) Repeat A and B until the tree is completed. + + D) The entry to each leaf now represents an entry that is a subset + of Cj. The entries at the leaves completely partition Cj in + such a way that each entry is either completely overridden by + an entry in U, or is decorrelated with the entries in U. + + Add all the decorrelated entries at the leaves of the tree to U. + + + +Kent & Seo Standards Track [Page 80] + +RFC 4301 Security Architecture for IP December 2005 + + + 4) Get next Cj and go to 2. + + 5) When all entries in C have been processed, then U will contain an + decorrelated version of C. + + There are several optimizations that can be made to this algorithm. + A few of them are presented here. + + It is possible to optimize, or at least improve, the amount of + branching that occurs by carefully choosing the order of the + selectors used for the next branch. For example, if a selector Sjn + can be chosen so that all the values for that selector in T are equal + to or a superset of the value of Sjn in Cj, then only a single branch + needs to be created (since the complement will be null). + + Branches of the tree do not have to proceed with the entire + decorrelation algorithm. For example, if a node represents an entry + that is decorrelated with all the entries in U, then there is no + reason to continue decorrelating that branch. Also, if a branch is + completely overridden by an entry in U, then there is no reason to + continue decorrelating the branch. + + An additional optimization is to check to see if a branch is + overridden by one of the CORRELATED entries in set C that has already + been decorrelated. That is, if the branch is part of decorrelating + Cj, then check to see if it was overridden by an entry Cm, m < j. + This is a valid check, since all the entries Cm are already expressed + in U. + + Along with checking if an entry is already decorrelated in step 2, + check if Cj is overridden by any entry in U. If it is, skip it since + it is not relevant. An entry x is overridden by another entry y if + every selector in x is equal to or a subset of the corresponding + selector in entry y. + + + + + + + + + + + + + + + + + +Kent & Seo Standards Track [Page 81] + +RFC 4301 Security Architecture for IP December 2005 + + +Appendix C: ASN.1 for an SPD Entry + + This appendix is included as an additional way to describe SPD + entries, as defined in Section 4.4.1. It uses ASN.1 syntax that has + been successfully compiled. This syntax is merely illustrative and + need not be employed in an implementation to achieve compliance. The + SPD description in Section 4.4.1 is normative. + + SPDModule + + {iso(1) org (3) dod (6) internet (1) security (5) mechanisms (5) + ipsec (8) asn1-modules (3) spd-module (1) } + + DEFINITIONS IMPLICIT TAGS ::= + + BEGIN + + IMPORTS + RDNSequence FROM PKIX1Explicit88 + { iso(1) identified-organization(3) + dod(6) internet(1) security(5) mechanisms(5) pkix(7) + id-mod(0) id-pkix1-explicit(18) } ; + + -- An SPD is a list of policies in decreasing order of preference + SPD ::= SEQUENCE OF SPDEntry + + SPDEntry ::= CHOICE { + iPsecEntry IPsecEntry, -- PROTECT traffic + bypassOrDiscard [0] BypassOrDiscardEntry } -- DISCARD/BYPASS + + IPsecEntry ::= SEQUENCE { -- Each entry consists of + name NameSets OPTIONAL, + pFPs PacketFlags, -- Populate from packet flags + -- Applies to ALL of the corresponding + -- traffic selectors in the SelectorLists + condition SelectorLists, -- Policy "condition" + processing Processing -- Policy "action" + } + + BypassOrDiscardEntry ::= SEQUENCE { + bypass BOOLEAN, -- TRUE BYPASS, FALSE DISCARD + condition InOutBound } + + InOutBound ::= CHOICE { + outbound [0] SelectorLists, + inbound [1] SelectorLists, + bothways [2] BothWays } + + + + +Kent & Seo Standards Track [Page 82] + +RFC 4301 Security Architecture for IP December 2005 + + + BothWays ::= SEQUENCE { + inbound SelectorLists, + outbound SelectorLists } + + NameSets ::= SEQUENCE { + passed SET OF Names-R, -- Matched to IKE ID by + -- responder + local SET OF Names-I } -- Used internally by IKE + -- initiator + + Names-R ::= CHOICE { -- IKEv2 IDs + dName RDNSequence, -- ID_DER_ASN1_DN + fqdn FQDN, -- ID_FQDN + rfc822 [0] RFC822Name, -- ID_RFC822_ADDR + keyID OCTET STRING } -- KEY_ID + + Names-I ::= OCTET STRING -- Used internally by IKE + -- initiator + + FQDN ::= IA5String + + RFC822Name ::= IA5String + + PacketFlags ::= BIT STRING { + -- if set, take selector value from packet + -- establishing SA + -- else use value in SPD entry + localAddr (0), + remoteAddr (1), + protocol (2), + localPort (3), + remotePort (4) } + + SelectorLists ::= SET OF SelectorList + + SelectorList ::= SEQUENCE { + localAddr AddrList, + remoteAddr AddrList, + protocol ProtocolChoice } + + Processing ::= SEQUENCE { + extSeqNum BOOLEAN, -- TRUE 64 bit counter, FALSE 32 bit + seqOverflow BOOLEAN, -- TRUE rekey, FALSE terminate & audit + fragCheck BOOLEAN, -- TRUE stateful fragment checking, + -- FALSE no stateful fragment checking + lifetime SALifetime, + spi ManualSPI, + algorithms ProcessingAlgs, + + + +Kent & Seo Standards Track [Page 83] + +RFC 4301 Security Architecture for IP December 2005 + + + tunnel TunnelOptions OPTIONAL } -- if absent, use + -- transport mode + + SALifetime ::= SEQUENCE { + seconds [0] INTEGER OPTIONAL, + bytes [1] INTEGER OPTIONAL } + + ManualSPI ::= SEQUENCE { + spi INTEGER, + keys KeyIDs } + + KeyIDs ::= SEQUENCE OF OCTET STRING + + ProcessingAlgs ::= CHOICE { + ah [0] IntegrityAlgs, -- AH + esp [1] ESPAlgs} -- ESP + + ESPAlgs ::= CHOICE { + integrity [0] IntegrityAlgs, -- integrity only + confidentiality [1] ConfidentialityAlgs, -- confidentiality + -- only + both [2] IntegrityConfidentialityAlgs, + combined [3] CombinedModeAlgs } + + IntegrityConfidentialityAlgs ::= SEQUENCE { + integrity IntegrityAlgs, + confidentiality ConfidentialityAlgs } + + -- Integrity Algorithms, ordered by decreasing preference + IntegrityAlgs ::= SEQUENCE OF IntegrityAlg + + -- Confidentiality Algorithms, ordered by decreasing preference + ConfidentialityAlgs ::= SEQUENCE OF ConfidentialityAlg + + -- Integrity Algorithms + IntegrityAlg ::= SEQUENCE { + algorithm IntegrityAlgType, + parameters ANY -- DEFINED BY algorithm -- OPTIONAL } + + IntegrityAlgType ::= INTEGER { + none (0), + auth-HMAC-MD5-96 (1), + auth-HMAC-SHA1-96 (2), + auth-DES-MAC (3), + auth-KPDK-MD5 (4), + auth-AES-XCBC-96 (5) + -- tbd (6..65535) + } + + + +Kent & Seo Standards Track [Page 84] + +RFC 4301 Security Architecture for IP December 2005 + + + -- Confidentiality Algorithms + ConfidentialityAlg ::= SEQUENCE { + algorithm ConfidentialityAlgType, + parameters ANY -- DEFINED BY algorithm -- OPTIONAL } + + ConfidentialityAlgType ::= INTEGER { + encr-DES-IV64 (1), + encr-DES (2), + encr-3DES (3), + encr-RC5 (4), + encr-IDEA (5), + encr-CAST (6), + encr-BLOWFISH (7), + encr-3IDEA (8), + encr-DES-IV32 (9), + encr-RC4 (10), + encr-NULL (11), + encr-AES-CBC (12), + encr-AES-CTR (13) + -- tbd (14..65535) + } + + CombinedModeAlgs ::= SEQUENCE OF CombinedModeAlg + + CombinedModeAlg ::= SEQUENCE { + algorithm CombinedModeType, + parameters ANY -- DEFINED BY algorithm} -- defined outside + -- of this document for AES modes. + + CombinedModeType ::= INTEGER { + comb-AES-CCM (1), + comb-AES-GCM (2) + -- tbd (3..65535) + } + + TunnelOptions ::= SEQUENCE { + dscp DSCP, + ecn BOOLEAN, -- TRUE Copy CE to inner header + df DF, + addresses TunnelAddresses } + + TunnelAddresses ::= CHOICE { + ipv4 IPv4Pair, + ipv6 [0] IPv6Pair } + + IPv4Pair ::= SEQUENCE { + local OCTET STRING (SIZE(4)), + remote OCTET STRING (SIZE(4)) } + + + +Kent & Seo Standards Track [Page 85] + +RFC 4301 Security Architecture for IP December 2005 + + + IPv6Pair ::= SEQUENCE { + local OCTET STRING (SIZE(16)), + remote OCTET STRING (SIZE(16)) } + + DSCP ::= SEQUENCE { + copy BOOLEAN, -- TRUE copy from inner header + -- FALSE do not copy + mapping OCTET STRING OPTIONAL} -- points to table + -- if no copy + + DF ::= INTEGER { + clear (0), + set (1), + copy (2) } + + ProtocolChoice::= CHOICE { + anyProt AnyProtocol, -- for ANY protocol + noNext [0] NoNextLayerProtocol, -- has no next layer + -- items + oneNext [1] OneNextLayerProtocol, -- has one next layer + -- item + twoNext [2] TwoNextLayerProtocol, -- has two next layer + -- items + fragment FragmentNoNext } -- has no next layer + -- info + + AnyProtocol ::= SEQUENCE { + id INTEGER (0), -- ANY protocol + nextLayer AnyNextLayers } + + AnyNextLayers ::= SEQUENCE { -- with either + first AnyNextLayer, -- ANY next layer selector + second AnyNextLayer } -- ANY next layer selector + + NoNextLayerProtocol ::= INTEGER (2..254) + + FragmentNoNext ::= INTEGER (44) -- Fragment identifier + + OneNextLayerProtocol ::= SEQUENCE { + id INTEGER (1..254), -- ICMP, MH, ICMPv6 + nextLayer NextLayerChoice } -- ICMP Type*256+Code + -- MH Type*256 + + TwoNextLayerProtocol ::= SEQUENCE { + id INTEGER (2..254), -- Protocol + local NextLayerChoice, -- Local and + remote NextLayerChoice } -- Remote ports + + + + +Kent & Seo Standards Track [Page 86] + +RFC 4301 Security Architecture for IP December 2005 + + + NextLayerChoice ::= CHOICE { + any AnyNextLayer, + opaque [0] OpaqueNextLayer, + range [1] NextLayerRange } + + -- Representation of ANY in next layer field + AnyNextLayer ::= SEQUENCE { + start INTEGER (0), + end INTEGER (65535) } + + -- Representation of OPAQUE in next layer field. + -- Matches IKE convention + OpaqueNextLayer ::= SEQUENCE { + start INTEGER (65535), + end INTEGER (0) } + + -- Range for a next layer field + NextLayerRange ::= SEQUENCE { + start INTEGER (0..65535), + end INTEGER (0..65535) } + + -- List of IP addresses + AddrList ::= SEQUENCE { + v4List IPv4List OPTIONAL, + v6List [0] IPv6List OPTIONAL } + + -- IPv4 address representations + IPv4List ::= SEQUENCE OF IPv4Range + + IPv4Range ::= SEQUENCE { -- close, but not quite right ... + ipv4Start OCTET STRING (SIZE (4)), + ipv4End OCTET STRING (SIZE (4)) } + + -- IPv6 address representations + IPv6List ::= SEQUENCE OF IPv6Range + + IPv6Range ::= SEQUENCE { -- close, but not quite right ... + ipv6Start OCTET STRING (SIZE (16)), + ipv6End OCTET STRING (SIZE (16)) } + + END + + + + + + + + + + +Kent & Seo Standards Track [Page 87] + +RFC 4301 Security Architecture for IP December 2005 + + +Appendix D: Fragment Handling Rationale + + There are three issues that must be resolved regarding processing of + (plaintext) fragments in IPsec: + + - mapping a non-initial, outbound fragment to the right SA + (or finding the right SPD entry) + - verifying that a received, non-initial fragment is authorized + for the SA via which it is received + - mapping outbound and inbound non-initial fragments to the + right SPD/cache entry, for BYPASS/DISCARD traffic + + The first and third issues arise because we need a deterministic + algorithm for mapping traffic to SAs (and SPD/cache entries). All + three issues are important because we want to make sure that + non-initial fragments that cross the IPsec boundary do not cause the + access control policies in place at the receiver (or transmitter) to + be violated. + +D.1. Transport Mode and Fragments + + First, we note that transport mode SAs have been defined to not carry + fragments. This is a carryover from RFC 2401, where transport mode + SAs always terminated at endpoints. This is a fundamental + requirement because, in the worst case, an IPv4 fragment to which + IPsec was applied might then be fragmented (as a ciphertext packet), + en route to the destination. IP fragment reassembly procedures at + the IPsec receiver would not be able to distinguish between pre-IPsec + fragments and fragments created after IPsec processing. + + For IPv6, only the sender is allowed to fragment a packet. As for + IPv4, an IPsec implementation is allowed to fragment tunnel mode + packets after IPsec processing, because it is the sender relative to + the (outer) tunnel header. However, unlike IPv4, it would be + feasible to carry a plaintext fragment on a transport mode SA, + because the fragment header in IPv6 would appear after the AH or ESP + header, and thus would not cause confusion at the receiver with + respect to reassembly. Specifically, the receiver would not attempt + reassembly for the fragment until after IPsec processing. To keep + things simple, this specification prohibits carriage of fragments on + transport mode SAs for IPv6 traffic. + + When only end systems used transport mode SAs, the prohibition on + carriage of fragments was not a problem, since we assumed that the + end system could be configured to not offer a fragment to IPsec. For + a native host implementation, this seems reasonable, and, as someone + already noted, RFC 2401 warned that a BITS implementation might have + to reassemble fragments before performing an SA lookup. (It would + + + +Kent & Seo Standards Track [Page 88] + +RFC 4301 Security Architecture for IP December 2005 + + + then apply AH or ESP and could re-fragment the packet after IPsec + processing.) Because a BITS implementation is assumed to be able to + have access to all traffic emanating from its host, even if the host + has multiple interfaces, this was deemed a reasonable mandate. + + In this specification, it is acceptable to use transport mode in + cases where the IPsec implementation is not the ultimate destination, + e.g., between two SGs. In principle, this creates a new opportunity + for outbound, plaintext fragments to be mapped to a transport mode SA + for IPsec processing. However, in these new contexts in which a + transport mode SA is now approved for use, it seems likely that we + can continue to prohibit transmission of fragments, as seen by IPsec, + i.e., packets that have an "outer header" with a non-zero fragment + offset field. For example, in an IP overlay network, packets being + sent over transport mode SAs are IP-in-IP tunneled and thus have the + necessary inner header to accommodate fragmentation prior to IPsec + processing. When carried via a transport mode SA, IPsec would not + examine the inner IP header for such traffic, and thus would not + consider the packet to be a fragment. + +D.2. Tunnel Mode and Fragments + + For tunnel mode SAs, it has always been the case that outbound + fragments might arrive for processing at an IPsec implementation. + The need to accommodate fragmented outbound packets can pose a + problem because a non-initial fragment generally will not contain the + port fields associated with a next layer protocol such as TCP, UDP, + or SCTP. Thus, depending on the SPD configuration for a given IPsec + implementation, plaintext fragments might or might not pose a + problem. + + For example, if the SPD requires that all traffic between two address + ranges is offered IPsec protection (no BYPASS or DISCARD SPD entries + apply to this address range), then it should be easy to carry + non-initial fragments on the SA defined for this address range, since + the SPD entry implies an intent to carry ALL traffic between the + address ranges. But, if there are multiple SPD entries that could + match a fragment, and if these entries reference different subsets of + port fields (vs. ANY), then it is not possible to map an outbound + non-initial fragment to the right entry, unambiguously. (If we choose + to allow carriage of fragments on transport mode SAs for IPv6, the + problems arises in that context as well.) + + This problem largely, though not exclusively, motivated the + definition of OPAQUE as a selector value for port fields in RFC 2401. + The other motivation for OPAQUE is the observation that port fields + might not be accessible due to the prior application of IPsec. For + example, if a host applied IPsec to its traffic and that traffic + + + +Kent & Seo Standards Track [Page 89] + +RFC 4301 Security Architecture for IP December 2005 + + + arrived at an SG, these fields would be encrypted. The algorithm + specified for locating the "next layer protocol" described in RFC + 2401 also motivated use of OPAQUE to accommodate an encrypted next + layer protocol field in such circumstances. Nonetheless, the primary + use of the OPAQUE value was to match traffic selector fields in + packets that did not contain port fields (non-initial fragments), or + packets in which the port fields were already encrypted (as a result + of nested application of IPsec). RFC 2401 was ambiguous in + discussing the use of OPAQUE vs. ANY, suggesting in some places that + ANY might be an alternative to OPAQUE. + + We gain additional access control capability by defining both ANY and + OPAQUE values. OPAQUE can be defined to match only fields that are + not accessible. We could define ANY as the complement of OPAQUE, + i.e., it would match all values but only for accessible port fields. + We have therefore simplified the procedure employed to locate the + next layer protocol in this document, so that we treat ESP and AH as + next layer protocols. As a result, the notion of an encrypted next + layer protocol field has vanished, and there is also no need to worry + about encrypted port fields either. And accordingly, OPAQUE will be + applicable only to non-initial fragments. + + Since we have adopted the definitions above for ANY and OPAQUE, we + need to clarify how these values work when the specified protocol + does not have port fields, and when ANY is used for the protocol + selector. Accordingly, if a specific protocol value is used as a + selector, and if that protocol has no port fields, then the port + field selectors are to be ignored and ANY MUST be specified as the + value for the port fields. (In this context, ICMP TYPE and CODE + values are lumped together as a single port field (for IKEv2 + negotiation), as is the IPv6 Mobility Header TYPE value.) If the + protocol selector is ANY, then this should be treated as equivalent + to specifying a protocol for which no port fields are defined, and + thus the port selectors should be ignored, and MUST be set to ANY. + +D.3. The Problem of Non-Initial Fragments + + For an SG implementation, it is obvious that fragments might arrive + from end systems behind the SG. A BITW implementation also may + encounter fragments from a host or gateway behind it. (As noted + earlier, native host implementations and BITS implementations + probably can avoid the problems described below.) In the worst case, + fragments from a packet might arrive at distinct BITW or SG + instantiations and thus preclude reassembly as a solution option. + Hence, in RFC 2401 we adopted a general requirement that fragments + must be accommodated in tunnel mode for all implementations. However, + + + + + +Kent & Seo Standards Track [Page 90] + +RFC 4301 Security Architecture for IP December 2005 + + + RFC 2401 did not provide a perfect solution. The use of OPAQUE as a + selector value for port fields (a SHOULD in RFC 2401) allowed an SA + to carry non-initial fragments. + + Using the features defined in RFC 2401, if one defined an SA between + two IPsec (SG or BITW) implementations using the OPAQUE value for + both port fields, then all non-initial fragments matching the + source/destination (S/D) address and protocol values for the SA would + be mapped to that SA. Initial fragments would NOT map to this SA, if + we adopt a strict definition of OPAQUE. However, RFC 2401 did not + provide detailed guidance on this and thus it may not have been + apparent that use of this feature would essentially create a + "non-initial fragment only" SA. + + In the course of discussing the "fragment-only" SA approach, it was + noted that some subtle problems, problems not considered in RFC 2401, + would have to be avoided. For example, an SA of this sort must be + configured to offer the "highest quality" security services for any + traffic between the indicated S/D addresses (for the specified + protocol). This is necessary to ensure that any traffic captured by + the fragment-only SA is not offered degraded security relative to + what it would have been offered if the packet were not fragmented. A + possible problem here is that we may not be able to identify the + "highest quality" security services defined for use between two IPsec + implementation, since the choice of security protocols, options, and + algorithms is a lattice, not a totally ordered set. (We might safely + say that BYPASS < AH < ESP w/integrity, but it gets complicated if we + have multiple ESP encryption or integrity algorithm options.) So, one + has to impose a total ordering on these security parameters to make + this work, but this can be done locally. + + However, this conservative strategy has a possible performance + downside. If most traffic traversing an IPsec implementation for a + given S/D address pair (and specified protocol) is bypassed, then a + fragment-only SA for that address pair might cause a dramatic + increase in the volume of traffic afforded crypto processing. If the + crypto implementation cannot support high traffic rates, this could + cause problems. (An IPsec implementation that is capable of line rate + or near line rate crypto performance would not be adversely affected + by this SA configuration approach. Nonetheless, the performance + impact is a potential concern, specific to implementation + capabilities.) + + Another concern is that non-initial fragments sent over a dedicated + SA might be used to effect overlapping reassembly attacks, when + combined with an apparently acceptable initial fragment. (This sort + of attack assumes creation of bogus fragments and is not a side + effect of normal fragmentation.) This concern is easily addressed in + + + +Kent & Seo Standards Track [Page 91] + +RFC 4301 Security Architecture for IP December 2005 + + + IPv4, by checking the fragment offset value to ensure that no + non-initial fragments have a small enough offset to overlap port + fields that should be contained in the initial fragment. Recall that + the IPv4 MTU minimum is 576 bytes, and the max IP header length is 60 + bytes, so any ports should be present in the initial fragment. If we + require all non-initial fragments to have an offset of, say, 128 or + greater, just to be on the safe side, this should prevent successful + attacks of this sort. If the intent is only to protect against this + sort of reassembly attack, this check need be implemented only by a + receiver. + + IPv6 also has a fragment offset, carried in the fragmentation + extension header. However, IPv6 extension headers are variable in + length and there is no analogous max header length value that we can + use to check non-initial fragments, to reject ones that might be used + for an attack of the sort noted above. A receiver would need to + maintain state analogous to reassembly state, to provide equivalent + protection. So, only for IPv4 is it feasible to impose a fragment + offset check that would reject attacks designed to circumvent port + field checks by IPsec (or firewalls) when passing non-initial + fragments. + + Another possible concern is that in some topologies and SPD + configurations this approach might result in an access control + surprise. The notion is that if we create an SA to carry ALL + (non-initial) fragments, then that SA would carry some traffic that + might otherwise arrive as plaintext via a separate path, e.g., a path + monitored by a proxy firewall. But, this concern arises only if the + other path allows initial fragments to traverse it without requiring + reassembly, presumably a bad idea for a proxy firewall. Nonetheless, + this does represent a potential problem in some topologies and under + certain assumptions with respect to SPD and (other) firewall rule + sets, and administrators need to be warned of this possibility. + + A less serious concern is that non-initial fragments sent over a + non-initial fragment-only SA might represent a DoS opportunity, in + that they could be sent when no valid, initial fragment will ever + arrive. This might be used to attack hosts behind an SG or BITW + device. However, the incremental risk posed by this sort of attack, + which can be mounted only by hosts behind an SG or BITW device, seems + small. + + If we interpret the ANY selector value as encompassing OPAQUE, then a + single SA with ANY values for both port fields would be able to + accommodate all traffic matching the S/D address and protocol traffic + selectors, an alternative to using the OPAQUE value. But, using ANY + + + + + +Kent & Seo Standards Track [Page 92] + +RFC 4301 Security Architecture for IP December 2005 + + + here precludes multiple, distinct SAs between the same IPsec + implementations for the same address pairs and protocol. So, it is + not an exactly equivalent alternative. + + Fundamentally, fragment handling problems arise only when more than + one SA is defined with the same S/D address and protocol selector + values, but with different port field selector values. + +D.4. BYPASS/DISCARD Traffic + + We also have to address the non-initial fragment processing issue for + BYPASS/DISCARD entries, independent of SA processing. This is + largely a local matter for two reasons: + + 1) We have no means for coordinating SPD entries for such + traffic between IPsec implementations since IKE is not + invoked. + 2) Many of these entries refer to traffic that is NOT + directed to or received from a location that is using + IPsec. So there is no peer IPsec implementation with + which to coordinate via any means. + + However, this document should provide guidance here, consistent with + our goal of offering a well-defined, access control function for all + traffic, relative to the IPsec boundary. To that end, this document + says that implementations MUST support fragment reassembly for + BYPASS/DISCARD traffic when port fields are specified. An + implementation also MUST permit a user or administrator to accept + such traffic or reject such traffic using the SPD conventions + described in Section 4.4.1. The concern is that BYPASS of a + cleartext, non-initial fragment arriving at an IPsec implementation + could undermine the security afforded IPsec-protected traffic + directed to the same destination. For example, consider an IPsec + implementation configured with an SPD entry that calls for + IPsec-protection of traffic between a specific source/destination + address pair, and for a specific protocol and destination port, e.g., + TCP traffic on port 23 (Telnet). Assume that the implementation also + allows BYPASS of traffic from the same source/destination address + pair and protocol, but for a different destination port, e.g., port + 119 (NNTP). An attacker could send a non-initial fragment (with a + forged source address) that, if bypassed, could overlap with + IPsec-protected traffic from the same source and thus violate the + integrity of the IPsec-protected traffic. Requiring stateful + fragment checking for BYPASS entries with non-trivial port ranges + prevents attacks of this sort. + + + + + + +Kent & Seo Standards Track [Page 93] + +RFC 4301 Security Architecture for IP December 2005 + + +D.5. Just say no to ports? + + It has been suggested that we could avoid the problems described + above by not allowing port field selectors to be used in tunnel mode. + But the discussion above shows this to be an unnecessarily stringent + approach, i.e., since no problems arise for the native OS and BITS + implementations. Moreover, some WG members have described scenarios + where use of tunnel mode SAs with (non-trivial) port field selectors + is appropriate. So the challenge is defining a strategy that can + deal with this problem in BITW and SG contexts. Also note that + BYPASS/DISCARD entries in the SPD that make use of ports pose the + same problems, irrespective of tunnel vs. transport mode notions. + + Some folks have suggested that a firewall behind an SG or BITW should + be left to enforce port-level access controls and the effects of + fragmentation. However, this seems to be an incongruous suggestion + in that elsewhere in IPsec (e.g., in IKE payloads) we are concerned + about firewalls that always discard fragments. If many firewalls + don't pass fragments in general, why should we expect them to deal + with fragments in this case? So, this analysis rejects the suggestion + of disallowing use of port field selectors with tunnel mode SAs. + +D.6. Other Suggested Solutions + + One suggestion is to reassemble fragments at the sending IPsec + implementation, and thus avoid the problem entirely. This approach + is invisible to a receiver and thus could be adopted as a purely + local implementation option. + + A more sophisticated version of this suggestion calls for + establishing and maintaining minimal state from each initial fragment + encountered, to allow non-initial fragments to be matched to the + right SAs or SPD/cache entries. This implies an extension to the + current processing model (and the old one). The IPsec implementation + would intercept all fragments; capture Source/Destination IP + addresses, protocol, packet ID, and port fields from initial + fragments; and then use this data to map non-initial fragments to SAs + that require port fields. If this approach is employed, the receiver + needs to employ an equivalent scheme, as it too must verify that + received fragments are consistent with SA selector values. A + non-initial fragment that arrives prior to an initial fragment could + be cached or discarded, awaiting arrival of the corresponding initial + fragment. + + A downside of both approaches noted above is that they will not + always work. When a BITW device or SG is configured in a topology + that might allow some fragments for a packet to be processed at + different SGs or BITW devices, then there is no guarantee that all + + + +Kent & Seo Standards Track [Page 94] + +RFC 4301 Security Architecture for IP December 2005 + + + fragments will ever arrive at the same IPsec device. This approach + also raises possible processing problems. If the sender caches + non-initial fragments until the corresponding initial fragment + arrives, buffering problems might arise, especially at high speeds. + If the non-initial fragments are discarded rather than cached, there + is no guarantee that traffic will ever pass, e.g., retransmission + will result in different packet IDs that cannot be matched with prior + transmissions. In any case, housekeeping procedures will be needed + to decide when to delete the fragment state data, adding some + complexity to the system. Nonetheless, this is a viable solution in + some topologies, and these are likely to be common topologies. + + The Working Group rejected an earlier version of the convention of + creating an SA to carry only non-initial fragments, something that + was supported implicitly under the RFC 2401 model via use of OPAQUE + port fields, but never clearly articulated in RFC 2401. The + (rejected) text called for each non-initial fragment to be treated as + protocol 44 (the IPv6 fragment header protocol ID) by the sender and + receiver. This approach has the potential to make IPv4 and IPv6 + fragment handling more uniform, but it does not fundamentally change + the problem, nor does it address the issue of fragment handling for + BYPASS/DISCARD traffic. Given the fragment overlap attack problem + that IPv6 poses, it does not seem that it is worth the effort to + adopt this strategy. + +D.7. Consistency + + Earlier, the WG agreed to allow an IPsec BITS, BITW, or SG to perform + fragmentation prior to IPsec processing. If this fragmentation is + performed after SA lookup at the sender, there is no "mapping to the + right SA" problem. But, the receiver still needs to be able to + verify that the non-initial fragments are consistent with the SA via + which they are received. Since the initial fragment might be lost en + route, the receiver encounters all of the potential problems noted + above. Thus, if we are to be consistent in our decisions, we need to + say how a receiver will deal with the non-initial fragments that + arrive. + +D.8. Conclusions + + There is no simple, uniform way to handle fragments in all contexts. + Different approaches work better in different contexts. Thus, this + document offers 3 choices -- one MUST and two MAYs. At some point in + the future, if the community gains experience with the two MAYs, they + may become SHOULDs or MUSTs or other approaches may be proposed. + + + + + + +Kent & Seo Standards Track [Page 95] + +RFC 4301 Security Architecture for IP December 2005 + + +Appendix E: Example of Supporting Nested SAs via SPD and Forwarding + Table Entries + + This appendix provides an example of how to configure the SPD and + forwarding tables to support a nested pair of SAs, consistent with + the new processing model. For simplicity, this example assumes just + one SPD-I. + + The goal in this example is to support a transport mode SA from A to + C, carried over a tunnel mode SA from A to B. For example, A might + be a laptop connected to the public Internet, B might be a firewall + that protects a corporate network, and C might be a server on the + corporate network that demands end-to-end authentication of A's + traffic. + + +---+ +---+ +---+ + | A |=====| B | | C | + | |------------| | + | |=====| | | | + +---+ +---+ +---+ + + A's SPD contains entries of the form: + + Next Layer + Rule Local Remote Protocol Action + ---- ----- ------ ---------- ----------------------- + 1 C A ESP BYPASS + 2 A C ICMP,ESP PROTECT(ESP,tunnel,integr+conf) + 3 A C ANY PROTECT(ESP,transport,integr-only) + 4 A B ICMP,IKE BYPASS + + A's unprotected-side forwarding table is set so that outbound packets + destined for C are looped back to the protected side. A's + protected-side forwarding table is set so that inbound ESP packets + are looped back to the unprotected side. A's forwarding tables + contain entries of the form: + + Unprotected-side forwarding table + + Rule Local Remote Protocol Action + ---- ----- ------ -------- --------------------------- + 1 A C ANY loop back to protected side + 2 A B ANY forward to B + + + + + + + + +Kent & Seo Standards Track [Page 96] + +RFC 4301 Security Architecture for IP December 2005 + + + Protected-side forwarding table + + Rule Local Remote Protocol Action + ---- ----- ------ -------- ----------------------------- + 1 A C ESP loop back to unprotected side + + An outbound TCP packet from A to C would match SPD rule 3 and have + transport mode ESP applied to it. The unprotected-side forwarding + table would then loop back the packet. The packet is compared + against SPD-I (see Figure 2), matches SPD rule 1, and so it is + BYPASSed. The packet is treated as an outbound packet and compared + against the SPD for a third time. This time it matches SPD rule 2, + so ESP is applied in tunnel mode. This time the forwarding table + doesn't loop back the packet, because the outer destination address + is B, so the packet goes out onto the wire. + + An inbound TCP packet from C to A is wrapped in two ESP headers; the + outer header (ESP in tunnel mode) shows B as the source, whereas the + inner header (ESP transport mode) shows C as the source. Upon + arrival at A, the packet would be mapped to an SA based on the SPI, + have the outer header removed, and be decrypted and + integrity-checked. Then it would be matched against the SAD + selectors for this SA, which would specify C as the source and A as + the destination, derived from SPD rule 2. The protected-side + forwarding function would then send it back to the unprotected side + based on the addresses and the next layer protocol (ESP), indicative + of nesting. It is compared against SPD-O (see Figure 3) and found to + match SPD rule 1, so it is BYPASSed. The packet is mapped to an SA + based on the SPI, integrity-checked, and compared against the SAD + selectors derived from SPD rule 3. The forwarding function then + passes it up to the next layer, because it isn't an ESP packet. + + + + + + + + + + + + + + + + + + + + +Kent & Seo Standards Track [Page 97] + +RFC 4301 Security Architecture for IP December 2005 + + +References + +Normative References + + [BBCDWW98] Blake, S., Black, D., Carlson, M., Davies, E., Wang, + Z., and W. Weiss, "An Architecture for Differentiated + Service", RFC 2475, December 1998. + + [Bra97] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Level", BCP 14, RFC 2119, March 1997. + + [CD98] Conta, A. and S. Deering, "Internet Control Message + Protocol (ICMPv6) for the Internet Protocol Version 6 + (IPv6) Specification", RFC 2463, December 1998. + + [DH98] Deering, S., and R. Hinden, "Internet Protocol, + Version 6 (IPv6) Specification", RFC 2460, December + 1998. + + [Eas05] 3rd Eastlake, D., "Cryptographic Algorithm + Implementation Requirements For Encapsulating Security + Payload (ESP) and Authentication Header (AH)", RFC + 4305, December 2005. + + [HarCar98] Harkins, D. and D. Carrel, "The Internet Key Exchange + (IKE)", RFC 2409, November 1998. + + [Kau05] Kaufman, C., Ed., "The Internet Key Exchange (IKEv2) + Protocol", RFC 4306, December 2005. + + [Ken05a] Kent, S., "IP Encapsulating Security Payload (ESP)", + RFC 4303, December 2005. + + [Ken05b] Kent, S., "IP Authentication Header", RFC 4302, + December 2005. + + [MD90] Mogul, J. and S. Deering, "Path MTU discovery", RFC + 1191, November 1990. + + [Mobip] Johnson, D., Perkins, C., and J. Arkko, "Mobility + Support in IPv6", RFC 3775, June 2004. + + [Pos81a] Postel, J., "Internet Protocol", STD 5, RFC 791, + September 1981. + + [Pos81b] Postel, J., "Internet Control Message Protocol", RFC + 792, September 1981. + + + + +Kent & Seo Standards Track [Page 98] + +RFC 4301 Security Architecture for IP December 2005 + + + [Sch05] Schiller, J., "Cryptographic Algorithms for use in the + Internet Key Exchange Version 2 (IKEv2)", RFC 4307, + December 2005. + + [WaKiHo97] Wahl, M., Kille, S., and T. Howes, "Lightweight + Directory Access Protocol (v3): UTF-8 String + Representation of Distinguished Names", RFC 2253, + December 1997. + +Informative References + + [CoSa04] Condell, M., and L. Sanchez, "On the Deterministic + Enforcement of Un-ordered Security Policies", BBN + Technical Memo 1346, March 2004. + + [FaLiHaMeTr00] Farinacci, D., Li, T., Hanks, S., Meyer, D., and P. + Traina, "Generic Routing Encapsulation (GRE)", RFC + 2784, March 2000. + + [Gro02] Grossman, D., "New Terminology and Clarifications for + Diffserv", RFC 3260, April 2002. + [HC03] Holbrook, H. and B. Cain, "Source Specific Multicast + for IP", Work in Progress, November 3, 2002. + + [HA94] Haller, N. and R. Atkinson, "On Internet + Authentication", RFC 1704, October 1994. + + [NiBlBaBL98] Nichols, K., Blake, S., Baker, F., and D. Black, + "Definition of the Differentiated Services Field (DS + Field) in the IPv4 and IPv6 Headers", RFC 2474, + December 1998. + + [Per96] Perkins, C., "IP Encapsulation within IP", RFC 2003, + October 1996. + + [RaFlBl01] Ramakrishnan, K., Floyd, S., and D. Black, "The + Addition of Explicit Congestion Notification (ECN) to + IP", RFC 3168, September 2001. + + [RFC2401] Kent, S. and R. Atkinson, "Security Architecture for + the Internet Protocol", RFC 2401, November 1998. + + [RFC2983] Black, D., "Differentiated Services and Tunnels", RFC + 2983, October 2000. + + [RFC3547] Baugher, M., Weis, B., Hardjono, T., and H. Harney, + "The Group Domain of Interpretation", RFC 3547, July + 2003. + + + +Kent & Seo Standards Track [Page 99] + +RFC 4301 Security Architecture for IP December 2005 + + + [RFC3740] Hardjono, T. and B. Weis, "The Multicast Group + Security Architecture", RFC 3740, March 2004. + + [RaCoCaDe04] Rajahalme, J., Conta, A., Carpenter, B., and S. + Deering, "IPv6 Flow Label Specification", RFC 3697, + March 2004. + + [Sch94] Schneier, B., Applied Cryptography, Section 8.6, John + Wiley & Sons, New York, NY, 1994. + + [Shi00] Shirey, R., "Internet Security Glossary", RFC 2828, + May 2000. + + [SMPT01] Shacham, A., Monsour, B., Pereira, R., and M. Thomas, + "IP Payload Compression Protocol (IPComp)", RFC 3173, + September 2001. + + [ToEgWa04] Touch, J., Eggert, L., and Y. Wang, "Use of IPsec + Transport Mode for Dynamic Routing", RFC 3884, + September 2004. + + [VK83] V.L. Voydock & S.T. Kent, "Security Mechanisms in + High-level Networks", ACM Computing Surveys, Vol. 15, + No. 2, June 1983. + +Authors' Addresses + + Stephen Kent + BBN Technologies + 10 Moulton Street + Cambridge, MA 02138 + USA + + Phone: +1 (617) 873-3988 + EMail: kent@bbn.com + + + Karen Seo + BBN Technologies + 10 Moulton Street + Cambridge, MA 02138 + USA + + Phone: +1 (617) 873-3152 + EMail: kseo@bbn.com + + + + + + +Kent & Seo Standards Track [Page 100] + +RFC 4301 Security Architecture for IP December 2005 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2005). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at ietf- + ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + +Kent & Seo Standards Track [Page 101] + diff --git a/doc/standards/rfc4306.txt b/doc/standards/rfc4306.txt new file mode 100644 index 000000000..fad6cea0e --- /dev/null +++ b/doc/standards/rfc4306.txt @@ -0,0 +1,5547 @@ + + + + + + +Network Working Group C. Kaufman, Ed. +Request for Comments: 4306 Microsoft +Obsoletes: 2407, 2408, 2409 December 2005 +Category: Standards Track + + + Internet Key Exchange (IKEv2) Protocol + +Status of This Memo + + This document specifies an Internet standards track protocol for the + Internet community, and requests discussion and suggestions for + improvements. Please refer to the current edition of the "Internet + Official Protocol Standards" (STD 1) for the standardization state + and status of this protocol. Distribution of this memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2005). + +Abstract + + This document describes version 2 of the Internet Key Exchange (IKE) + protocol. IKE is a component of IPsec used for performing mutual + authentication and establishing and maintaining security associations + (SAs). + + This version of the IKE specification combines the contents of what + were previously separate documents, including Internet Security + Association and Key Management Protocol (ISAKMP, RFC 2408), IKE (RFC + 2409), the Internet Domain of Interpretation (DOI, RFC 2407), Network + Address Translation (NAT) Traversal, Legacy authentication, and + remote address acquisition. + + Version 2 of IKE does not interoperate with version 1, but it has + enough of the header format in common that both versions can + unambiguously run over the same UDP port. + + + + + + + + + + + + + + +Kaufman Standards Track [Page 1] + +RFC 4306 IKEv2 December 2005 + + +Table of Contents + + 1. Introduction ....................................................3 + 1.1. Usage Scenarios ............................................5 + 1.2. The Initial Exchanges ......................................7 + 1.3. The CREATE_CHILD_SA Exchange ...............................9 + 1.4. The INFORMATIONAL Exchange ................................11 + 1.5. Informational Messages outside of an IKE_SA ...............12 + 2. IKE Protocol Details and Variations ............................12 + 2.1. Use of Retransmission Timers ..............................13 + 2.2. Use of Sequence Numbers for Message ID ....................14 + 2.3. Window Size for Overlapping Requests ......................14 + 2.4. State Synchronization and Connection Timeouts .............15 + 2.5. Version Numbers and Forward Compatibility .................17 + 2.6. Cookies ...................................................18 + 2.7. Cryptographic Algorithm Negotiation .......................21 + 2.8. Rekeying ..................................................22 + 2.9. Traffic Selector Negotiation ..............................24 + 2.10. Nonces ...................................................26 + 2.11. Address and Port Agility .................................26 + 2.12. Reuse of Diffie-Hellman Exponentials .....................27 + 2.13. Generating Keying Material ...............................27 + 2.14. Generating Keying Material for the IKE_SA ................28 + 2.15. Authentication of the IKE_SA .............................29 + 2.16. Extensible Authentication Protocol Methods ...............31 + 2.17. Generating Keying Material for CHILD_SAs .................33 + 2.18. Rekeying IKE_SAs Using a CREATE_CHILD_SA exchange ........34 + 2.19. Requesting an Internal Address on a Remote Network .......34 + 2.20. Requesting the Peer's Version ............................35 + 2.21. Error Handling ...........................................36 + 2.22. IPComp ...................................................37 + 2.23. NAT Traversal ............................................38 + 2.24. Explicit Congestion Notification (ECN) ...................40 + 3. Header and Payload Formats .....................................41 + 3.1. The IKE Header ............................................41 + 3.2. Generic Payload Header ....................................44 + 3.3. Security Association Payload ..............................46 + 3.4. Key Exchange Payload ......................................56 + 3.5. Identification Payloads ...................................56 + 3.6. Certificate Payload .......................................59 + 3.7. Certificate Request Payload ...............................61 + 3.8. Authentication Payload ....................................63 + 3.9. Nonce Payload .............................................64 + 3.10. Notify Payload ...........................................64 + 3.11. Delete Payload ...........................................72 + 3.12. Vendor ID Payload ........................................73 + 3.13. Traffic Selector Payload .................................74 + 3.14. Encrypted Payload ........................................77 + + + +Kaufman Standards Track [Page 2] + +RFC 4306 IKEv2 December 2005 + + + 3.15. Configuration Payload ....................................79 + 3.16. Extensible Authentication Protocol (EAP) Payload .........84 + 4. Conformance Requirements .......................................85 + 5. Security Considerations ........................................88 + 6. IANA Considerations ............................................90 + 7. Acknowledgements ...............................................91 + 8. References .....................................................91 + 8.1. Normative References ......................................91 + 8.2. Informative References ....................................92 + Appendix A: Summary of Changes from IKEv1 .........................96 + Appendix B: Diffie-Hellman Groups .................................97 + B.1. Group 1 - 768 Bit MODP ....................................97 + B.2. Group 2 - 1024 Bit MODP ...................................97 + +1. Introduction + + IP Security (IPsec) provides confidentiality, data integrity, access + control, and data source authentication to IP datagrams. These + services are provided by maintaining shared state between the source + and the sink of an IP datagram. This state defines, among other + things, the specific services provided to the datagram, which + cryptographic algorithms will be used to provide the services, and + the keys used as input to the cryptographic algorithms. + + Establishing this shared state in a manual fashion does not scale + well. Therefore, a protocol to establish this state dynamically is + needed. This memo describes such a protocol -- the Internet Key + Exchange (IKE). This is version 2 of IKE. Version 1 of IKE was + defined in RFCs 2407, 2408, and 2409 [Pip98, MSST98, HC98]. This + single document is intended to replace all three of those RFCs. + + Definitions of the primitive terms in this document (such as Security + Association or SA) can be found in [RFC4301]. + + Keywords "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT" and + "MAY" that appear in this document are to be interpreted as described + in [Bra97]. + + The term "Expert Review" is to be interpreted as defined in + [RFC2434]. + + IKE performs mutual authentication between two parties and + establishes an IKE security association (SA) that includes shared + secret information that can be used to efficiently establish SAs for + Encapsulating Security Payload (ESP) [RFC4303] and/or Authentication + Header (AH) [RFC4302] and a set of cryptographic algorithms to be + used by the SAs to protect the traffic that they carry. In this + document, the term "suite" or "cryptographic suite" refers to a + + + +Kaufman Standards Track [Page 3] + +RFC 4306 IKEv2 December 2005 + + + complete set of algorithms used to protect an SA. An initiator + proposes one or more suites by listing supported algorithms that can + be combined into suites in a mix-and-match fashion. IKE can also + negotiate use of IP Compression (IPComp) [IPCOMP] in connection with + an ESP and/or AH SA. We call the IKE SA an "IKE_SA". The SAs for + ESP and/or AH that get set up through that IKE_SA we call + "CHILD_SAs". + + All IKE communications consist of pairs of messages: a request and a + response. The pair is called an "exchange". We call the first + messages establishing an IKE_SA IKE_SA_INIT and IKE_AUTH exchanges + and subsequent IKE exchanges CREATE_CHILD_SA or INFORMATIONAL + exchanges. In the common case, there is a single IKE_SA_INIT + exchange and a single IKE_AUTH exchange (a total of four messages) to + establish the IKE_SA and the first CHILD_SA. In exceptional cases, + there may be more than one of each of these exchanges. In all cases, + all IKE_SA_INIT exchanges MUST complete before any other exchange + type, then all IKE_AUTH exchanges MUST complete, and following that + any number of CREATE_CHILD_SA and INFORMATIONAL exchanges may occur + in any order. In some scenarios, only a single CHILD_SA is needed + between the IPsec endpoints, and therefore there would be no + additional exchanges. Subsequent exchanges MAY be used to establish + additional CHILD_SAs between the same authenticated pair of endpoints + and to perform housekeeping functions. + + IKE message flow always consists of a request followed by a response. + It is the responsibility of the requester to ensure reliability. If + the response is not received within a timeout interval, the requester + needs to retransmit the request (or abandon the connection). + + The first request/response of an IKE session (IKE_SA_INIT) negotiates + security parameters for the IKE_SA, sends nonces, and sends Diffie- + Hellman values. + + The second request/response (IKE_AUTH) transmits identities, proves + knowledge of the secrets corresponding to the two identities, and + sets up an SA for the first (and often only) AH and/or ESP CHILD_SA. + + The types of subsequent exchanges are CREATE_CHILD_SA (which creates + a CHILD_SA) and INFORMATIONAL (which deletes an SA, reports error + conditions, or does other housekeeping). Every request requires a + response. An INFORMATIONAL request with no payloads (other than the + empty Encrypted payload required by the syntax) is commonly used as a + check for liveness. These subsequent exchanges cannot be used until + the initial exchanges have completed. + + + + + + +Kaufman Standards Track [Page 4] + +RFC 4306 IKEv2 December 2005 + + + In the description that follows, we assume that no errors occur. + Modifications to the flow should errors occur are described in + section 2.21. + +1.1. Usage Scenarios + + IKE is expected to be used to negotiate ESP and/or AH SAs in a number + of different scenarios, each with its own special requirements. + +1.1.1. Security Gateway to Security Gateway Tunnel + + +-+-+-+-+-+ +-+-+-+-+-+ + ! ! IPsec ! ! + Protected !Tunnel ! tunnel !Tunnel ! Protected + Subnet <-->!Endpoint !<---------->!Endpoint !<--> Subnet + ! ! ! ! + +-+-+-+-+-+ +-+-+-+-+-+ + + Figure 1: Security Gateway to Security Gateway Tunnel + + In this scenario, neither endpoint of the IP connection implements + IPsec, but network nodes between them protect traffic for part of the + way. Protection is transparent to the endpoints, and depends on + ordinary routing to send packets through the tunnel endpoints for + processing. Each endpoint would announce the set of addresses + "behind" it, and packets would be sent in tunnel mode where the inner + IP header would contain the IP addresses of the actual endpoints. + +1.1.2. Endpoint-to-Endpoint Transport + + +-+-+-+-+-+ +-+-+-+-+-+ + ! ! IPsec transport ! ! + !Protected! or tunnel mode SA !Protected! + !Endpoint !<---------------------------------------->!Endpoint ! + ! ! ! ! + +-+-+-+-+-+ +-+-+-+-+-+ + + Figure 2: Endpoint to Endpoint + + In this scenario, both endpoints of the IP connection implement + IPsec, as required of hosts in [RFC4301]. Transport mode will + commonly be used with no inner IP header. If there is an inner IP + header, the inner addresses will be the same as the outer addresses. + A single pair of addresses will be negotiated for packets to be + protected by this SA. These endpoints MAY implement application + layer access controls based on the IPsec authenticated identities of + the participants. This scenario enables the end-to-end security that + has been a guiding principle for the Internet since [RFC1958], + + + +Kaufman Standards Track [Page 5] + +RFC 4306 IKEv2 December 2005 + + + [RFC2775], and a method of limiting the inherent problems with + complexity in networks noted by [RFC3439]. Although this scenario + may not be fully applicable to the IPv4 Internet, it has been + deployed successfully in specific scenarios within intranets using + IKEv1. It should be more broadly enabled during the transition to + IPv6 and with the adoption of IKEv2. + + It is possible in this scenario that one or both of the protected + endpoints will be behind a network address translation (NAT) node, in + which case the tunneled packets will have to be UDP encapsulated so + that port numbers in the UDP headers can be used to identify + individual endpoints "behind" the NAT (see section 2.23). + +1.1.3. Endpoint to Security Gateway Tunnel + + +-+-+-+-+-+ +-+-+-+-+-+ + ! ! IPsec ! ! Protected + !Protected! tunnel !Tunnel ! Subnet + !Endpoint !<------------------------>!Endpoint !<--- and/or + ! ! ! ! Internet + +-+-+-+-+-+ +-+-+-+-+-+ + + Figure 3: Endpoint to Security Gateway Tunnel + + In this scenario, a protected endpoint (typically a portable roaming + computer) connects back to its corporate network through an IPsec- + protected tunnel. It might use this tunnel only to access + information on the corporate network, or it might tunnel all of its + traffic back through the corporate network in order to take advantage + of protection provided by a corporate firewall against Internet-based + attacks. In either case, the protected endpoint will want an IP + address associated with the security gateway so that packets returned + to it will go to the security gateway and be tunneled back. This IP + address may be static or may be dynamically allocated by the security + gateway. In support of the latter case, IKEv2 includes a mechanism + for the initiator to request an IP address owned by the security + gateway for use for the duration of its SA. + + In this scenario, packets will use tunnel mode. On each packet from + the protected endpoint, the outer IP header will contain the source + IP address associated with its current location (i.e., the address + that will get traffic routed to the endpoint directly), while the + inner IP header will contain the source IP address assigned by the + security gateway (i.e., the address that will get traffic routed to + the security gateway for forwarding to the endpoint). The outer + destination address will always be that of the security gateway, + while the inner destination address will be the ultimate destination + for the packet. + + + +Kaufman Standards Track [Page 6] + +RFC 4306 IKEv2 December 2005 + + + In this scenario, it is possible that the protected endpoint will be + behind a NAT. In that case, the IP address as seen by the security + gateway will not be the same as the IP address sent by the protected + endpoint, and packets will have to be UDP encapsulated in order to be + routed properly. + +1.1.4. Other Scenarios + + Other scenarios are possible, as are nested combinations of the + above. One notable example combines aspects of 1.1.1 and 1.1.3. A + subnet may make all external accesses through a remote security + gateway using an IPsec tunnel, where the addresses on the subnet are + routed to the security gateway by the rest of the Internet. An + example would be someone's home network being virtually on the + Internet with static IP addresses even though connectivity is + provided by an ISP that assigns a single dynamically assigned IP + address to the user's security gateway (where the static IP addresses + and an IPsec relay are provided by a third party located elsewhere). + +1.2. The Initial Exchanges + + Communication using IKE always begins with IKE_SA_INIT and IKE_AUTH + exchanges (known in IKEv1 as Phase 1). These initial exchanges + normally consist of four messages, though in some scenarios that + number can grow. All communications using IKE consist of + request/response pairs. We'll describe the base exchange first, + followed by variations. The first pair of messages (IKE_SA_INIT) + negotiate cryptographic algorithms, exchange nonces, and do a + Diffie-Hellman exchange [DH]. + + The second pair of messages (IKE_AUTH) authenticate the previous + messages, exchange identities and certificates, and establish the + first CHILD_SA. Parts of these messages are encrypted and integrity + protected with keys established through the IKE_SA_INIT exchange, so + the identities are hidden from eavesdroppers and all fields in all + the messages are authenticated. + + In the following descriptions, the payloads contained in the message + are indicated by names as listed below. + + Notation Payload + + AUTH Authentication + CERT Certificate + CERTREQ Certificate Request + CP Configuration + D Delete + E Encrypted + + + +Kaufman Standards Track [Page 7] + +RFC 4306 IKEv2 December 2005 + + + EAP Extensible Authentication + HDR IKE Header + IDi Identification - Initiator + IDr Identification - Responder + KE Key Exchange + Ni, Nr Nonce + N Notify + SA Security Association + TSi Traffic Selector - Initiator + TSr Traffic Selector - Responder + V Vendor ID + + The details of the contents of each payload are described in section + 3. Payloads that may optionally appear will be shown in brackets, + such as [CERTREQ], indicate that optionally a certificate request + payload can be included. + + The initial exchanges are as follows: + + Initiator Responder + ----------- ----------- + HDR, SAi1, KEi, Ni --> + + HDR contains the Security Parameter Indexes (SPIs), version numbers, + and flags of various sorts. The SAi1 payload states the + cryptographic algorithms the initiator supports for the IKE_SA. The + KE payload sends the initiator's Diffie-Hellman value. Ni is the + initiator's nonce. + + <-- HDR, SAr1, KEr, Nr, [CERTREQ] + + The responder chooses a cryptographic suite from the initiator's + offered choices and expresses that choice in the SAr1 payload, + completes the Diffie-Hellman exchange with the KEr payload, and sends + its nonce in the Nr payload. + + At this point in the negotiation, each party can generate SKEYSEED, + from which all keys are derived for that IKE_SA. All but the headers + of all the messages that follow are encrypted and integrity + protected. The keys used for the encryption and integrity protection + are derived from SKEYSEED and are known as SK_e (encryption) and SK_a + (authentication, a.k.a. integrity protection). A separate SK_e and + SK_a is computed for each direction. In addition to the keys SK_e + and SK_a derived from the DH value for protection of the IKE_SA, + another quantity SK_d is derived and used for derivation of further + keying material for CHILD_SAs. The notation SK { ... } indicates + that these payloads are encrypted and integrity protected using that + direction's SK_e and SK_a. + + + +Kaufman Standards Track [Page 8] + +RFC 4306 IKEv2 December 2005 + + + HDR, SK {IDi, [CERT,] [CERTREQ,] [IDr,] + AUTH, SAi2, TSi, TSr} --> + + The initiator asserts its identity with the IDi payload, proves + knowledge of the secret corresponding to IDi and integrity protects + the contents of the first message using the AUTH payload (see section + 2.15). It might also send its certificate(s) in CERT payload(s) and + a list of its trust anchors in CERTREQ payload(s). If any CERT + payloads are included, the first certificate provided MUST contain + the public key used to verify the AUTH field. The optional payload + IDr enables the initiator to specify which of the responder's + identities it wants to talk to. This is useful when the machine on + which the responder is running is hosting multiple identities at the + same IP address. The initiator begins negotiation of a CHILD_SA + using the SAi2 payload. The final fields (starting with SAi2) are + described in the description of the CREATE_CHILD_SA exchange. + + <-- HDR, SK {IDr, [CERT,] AUTH, + SAr2, TSi, TSr} + + The responder asserts its identity with the IDr payload, optionally + sends one or more certificates (again with the certificate containing + the public key used to verify AUTH listed first), authenticates its + identity and protects the integrity of the second message with the + AUTH payload, and completes negotiation of a CHILD_SA with the + additional fields described below in the CREATE_CHILD_SA exchange. + + The recipients of messages 3 and 4 MUST verify that all signatures + and MACs are computed correctly and that the names in the ID payloads + correspond to the keys used to generate the AUTH payload. + +1.3. The CREATE_CHILD_SA Exchange + + This exchange consists of a single request/response pair, and was + referred to as a phase 2 exchange in IKEv1. It MAY be initiated by + either end of the IKE_SA after the initial exchanges are completed. + + All messages following the initial exchange are cryptographically + protected using the cryptographic algorithms and keys negotiated in + the first two messages of the IKE exchange. These subsequent + messages use the syntax of the Encrypted Payload described in section + 3.14. All subsequent messages included an Encrypted Payload, even if + they are referred to in the text as "empty". + + Either endpoint may initiate a CREATE_CHILD_SA exchange, so in this + section the term "initiator" refers to the endpoint initiating this + exchange. + + + + +Kaufman Standards Track [Page 9] + +RFC 4306 IKEv2 December 2005 + + + A CHILD_SA is created by sending a CREATE_CHILD_SA request. The + CREATE_CHILD_SA request MAY optionally contain a KE payload for an + additional Diffie-Hellman exchange to enable stronger guarantees of + forward secrecy for the CHILD_SA. The keying material for the + CHILD_SA is a function of SK_d established during the establishment + of the IKE_SA, the nonces exchanged during the CREATE_CHILD_SA + exchange, and the Diffie-Hellman value (if KE payloads are included + in the CREATE_CHILD_SA exchange). + + In the CHILD_SA created as part of the initial exchange, a second KE + payload and nonce MUST NOT be sent. The nonces from the initial + exchange are used in computing the keys for the CHILD_SA. + + The CREATE_CHILD_SA request contains: + + Initiator Responder + ----------- ----------- + HDR, SK {[N], SA, Ni, [KEi], + [TSi, TSr]} --> + + The initiator sends SA offer(s) in the SA payload, a nonce in the Ni + payload, optionally a Diffie-Hellman value in the KEi payload, and + the proposed traffic selectors in the TSi and TSr payloads. If this + CREATE_CHILD_SA exchange is rekeying an existing SA other than the + IKE_SA, the leading N payload of type REKEY_SA MUST identify the SA + being rekeyed. If this CREATE_CHILD_SA exchange is not rekeying an + existing SA, the N payload MUST be omitted. If the SA offers include + different Diffie-Hellman groups, KEi MUST be an element of the group + the initiator expects the responder to accept. If it guesses wrong, + the CREATE_CHILD_SA exchange will fail, and it will have to retry + with a different KEi. + + The message following the header is encrypted and the message + including the header is integrity protected using the cryptographic + algorithms negotiated for the IKE_SA. + + The CREATE_CHILD_SA response contains: + + <-- HDR, SK {SA, Nr, [KEr], + [TSi, TSr]} + + The responder replies (using the same Message ID to respond) with the + accepted offer in an SA payload, and a Diffie-Hellman value in the + KEr payload if KEi was included in the request and the selected + cryptographic suite includes that group. If the responder chooses a + cryptographic suite with a different group, it MUST reject the + request. The initiator SHOULD repeat the request, but now with a KEi + payload from the group the responder selected. + + + +Kaufman Standards Track [Page 10] + +RFC 4306 IKEv2 December 2005 + + + The traffic selectors for traffic to be sent on that SA are specified + in the TS payloads, which may be a subset of what the initiator of + the CHILD_SA proposed. Traffic selectors are omitted if this + CREATE_CHILD_SA request is being used to change the key of the + IKE_SA. + +1.4. The INFORMATIONAL Exchange + + At various points during the operation of an IKE_SA, peers may desire + to convey control messages to each other regarding errors or + notifications of certain events. To accomplish this, IKE defines an + INFORMATIONAL exchange. INFORMATIONAL exchanges MUST ONLY occur + after the initial exchanges and are cryptographically protected with + the negotiated keys. + + Control messages that pertain to an IKE_SA MUST be sent under that + IKE_SA. Control messages that pertain to CHILD_SAs MUST be sent + under the protection of the IKE_SA which generated them (or its + successor if the IKE_SA was replaced for the purpose of rekeying). + + Messages in an INFORMATIONAL exchange contain zero or more + Notification, Delete, and Configuration payloads. The Recipient of + an INFORMATIONAL exchange request MUST send some response (else the + Sender will assume the message was lost in the network and will + retransmit it). That response MAY be a message with no payloads. + The request message in an INFORMATIONAL exchange MAY also contain no + payloads. This is the expected way an endpoint can ask the other + endpoint to verify that it is alive. + + ESP and AH SAs always exist in pairs, with one SA in each direction. + When an SA is closed, both members of the pair MUST be closed. When + SAs are nested, as when data (and IP headers if in tunnel mode) are + encapsulated first with IPComp, then with ESP, and finally with AH + between the same pair of endpoints, all of the SAs MUST be deleted + together. Each endpoint MUST close its incoming SAs and allow the + other endpoint to close the other SA in each pair. To delete an SA, + an INFORMATIONAL exchange with one or more delete payloads is sent + listing the SPIs (as they would be expected in the headers of inbound + packets) of the SAs to be deleted. The recipient MUST close the + designated SAs. Normally, the reply in the INFORMATIONAL exchange + will contain delete payloads for the paired SAs going in the other + direction. There is one exception. If by chance both ends of a set + of SAs independently decide to close them, each may send a delete + payload and the two requests may cross in the network. If a node + receives a delete request for SAs for which it has already issued a + delete request, it MUST delete the outgoing SAs while processing the + request and the incoming SAs while processing the response. In that + + + + +Kaufman Standards Track [Page 11] + +RFC 4306 IKEv2 December 2005 + + + case, the responses MUST NOT include delete payloads for the deleted + SAs, since that would result in duplicate deletion and could in + theory delete the wrong SA. + + A node SHOULD regard half-closed connections as anomalous and audit + their existence should they persist. Note that this specification + nowhere specifies time periods, so it is up to individual endpoints + to decide how long to wait. A node MAY refuse to accept incoming + data on half-closed connections but MUST NOT unilaterally close them + and reuse the SPIs. If connection state becomes sufficiently messed + up, a node MAY close the IKE_SA; doing so will implicitly close all + SAs negotiated under it. It can then rebuild the SAs it needs on a + clean base under a new IKE_SA. + + The INFORMATIONAL exchange is defined as: + + Initiator Responder + ----------- ----------- + HDR, SK {[N,] [D,] [CP,] ...} --> + <-- HDR, SK {[N,] [D,] [CP], ...} + + The processing of an INFORMATIONAL exchange is determined by its + component payloads. + +1.5. Informational Messages outside of an IKE_SA + + If an encrypted IKE packet arrives on port 500 or 4500 with an + unrecognized SPI, it could be because the receiving node has recently + crashed and lost state or because of some other system malfunction or + attack. If the receiving node has an active IKE_SA to the IP address + from whence the packet came, it MAY send a notification of the + wayward packet over that IKE_SA in an INFORMATIONAL exchange. If it + does not have such an IKE_SA, it MAY send an Informational message + without cryptographic protection to the source IP address. Such a + message is not part of an informational exchange, and the receiving + node MUST NOT respond to it. Doing so could cause a message loop. + +2. IKE Protocol Details and Variations + + IKE normally listens and sends on UDP port 500, though IKE messages + may also be received on UDP port 4500 with a slightly different + format (see section 2.23). Since UDP is a datagram (unreliable) + protocol, IKE includes in its definition recovery from transmission + errors, including packet loss, packet replay, and packet forgery. + IKE is designed to function so long as (1) at least one of a series + of retransmitted packets reaches its destination before timing out; + and (2) the channel is not so full of forged and replayed packets so + + + + +Kaufman Standards Track [Page 12] + +RFC 4306 IKEv2 December 2005 + + + as to exhaust the network or CPU capacities of either endpoint. Even + in the absence of those minimum performance requirements, IKE is + designed to fail cleanly (as though the network were broken). + + Although IKEv2 messages are intended to be short, they contain + structures with no hard upper bound on size (in particular, X.509 + certificates), and IKEv2 itself does not have a mechanism for + fragmenting large messages. IP defines a mechanism for fragmentation + of oversize UDP messages, but implementations vary in the maximum + message size supported. Furthermore, use of IP fragmentation opens + an implementation to denial of service attacks [KPS03]. Finally, + some NAT and/or firewall implementations may block IP fragments. + + All IKEv2 implementations MUST be able to send, receive, and process + IKE messages that are up to 1280 bytes long, and they SHOULD be able + to send, receive, and process messages that are up to 3000 bytes + long. IKEv2 implementations SHOULD be aware of the maximum UDP + message size supported and MAY shorten messages by leaving out some + certificates or cryptographic suite proposals if that will keep + messages below the maximum. Use of the "Hash and URL" formats rather + than including certificates in exchanges where possible can avoid + most problems. Implementations and configuration should keep in + mind, however, that if the URL lookups are possible only after the + IPsec SA is established, recursion issues could prevent this + technique from working. + +2.1. Use of Retransmission Timers + + All messages in IKE exist in pairs: a request and a response. The + setup of an IKE_SA normally consists of two request/response pairs. + Once the IKE_SA is set up, either end of the security association may + initiate requests at any time, and there can be many requests and + responses "in flight" at any given moment. But each message is + labeled as either a request or a response, and for each + request/response pair one end of the security association is the + initiator and the other is the responder. + + For every pair of IKE messages, the initiator is responsible for + retransmission in the event of a timeout. The responder MUST never + retransmit a response unless it receives a retransmission of the + request. In that event, the responder MUST ignore the retransmitted + request except insofar as it triggers a retransmission of the + response. The initiator MUST remember each request until it receives + the corresponding response. The responder MUST remember each + response until it receives a request whose sequence number is larger + than the sequence number in the response plus its window size (see + section 2.3). + + + + +Kaufman Standards Track [Page 13] + +RFC 4306 IKEv2 December 2005 + + + IKE is a reliable protocol, in the sense that the initiator MUST + retransmit a request until either it receives a corresponding reply + OR it deems the IKE security association to have failed and it + discards all state associated with the IKE_SA and any CHILD_SAs + negotiated using that IKE_SA. + +2.2. Use of Sequence Numbers for Message ID + + Every IKE message contains a Message ID as part of its fixed header. + This Message ID is used to match up requests and responses, and to + identify retransmissions of messages. + + The Message ID is a 32-bit quantity, which is zero for the first IKE + request in each direction. The IKE_SA initial setup messages will + always be numbered 0 and 1. Each endpoint in the IKE Security + Association maintains two "current" Message IDs: the next one to be + used for a request it initiates and the next one it expects to see in + a request from the other end. These counters increment as requests + are generated and received. Responses always contain the same + message ID as the corresponding request. That means that after the + initial exchange, each integer n may appear as the message ID in four + distinct messages: the nth request from the original IKE initiator, + the corresponding response, the nth request from the original IKE + responder, and the corresponding response. If the two ends make very + different numbers of requests, the Message IDs in the two directions + can be very different. There is no ambiguity in the messages, + however, because the (I)nitiator and (R)esponse bits in the message + header specify which of the four messages a particular one is. + + Note that Message IDs are cryptographically protected and provide + protection against message replays. In the unlikely event that + Message IDs grow too large to fit in 32 bits, the IKE_SA MUST be + closed. Rekeying an IKE_SA resets the sequence numbers. + +2.3. Window Size for Overlapping Requests + + In order to maximize IKE throughput, an IKE endpoint MAY issue + multiple requests before getting a response to any of them if the + other endpoint has indicated its ability to handle such requests. + For simplicity, an IKE implementation MAY choose to process requests + strictly in order and/or wait for a response to one request before + issuing another. Certain rules must be followed to ensure + interoperability between implementations using different strategies. + + After an IKE_SA is set up, either end can initiate one or more + requests. These requests may pass one another over the network. An + IKE endpoint MUST be prepared to accept and process a request while + + + + +Kaufman Standards Track [Page 14] + +RFC 4306 IKEv2 December 2005 + + + it has a request outstanding in order to avoid a deadlock in this + situation. An IKE endpoint SHOULD be prepared to accept and process + multiple requests while it has a request outstanding. + + An IKE endpoint MUST wait for a response to each of its messages + before sending a subsequent message unless it has received a + SET_WINDOW_SIZE Notify message from its peer informing it that the + peer is prepared to maintain state for multiple outstanding messages + in order to allow greater throughput. + + An IKE endpoint MUST NOT exceed the peer's stated window size for + transmitted IKE requests. In other words, if the responder stated + its window size is N, then when the initiator needs to make a request + X, it MUST wait until it has received responses to all requests up + through request X-N. An IKE endpoint MUST keep a copy of (or be able + to regenerate exactly) each request it has sent until it receives the + corresponding response. An IKE endpoint MUST keep a copy of (or be + able to regenerate exactly) the number of previous responses equal to + its declared window size in case its response was lost and the + initiator requests its retransmission by retransmitting the request. + + An IKE endpoint supporting a window size greater than one SHOULD be + capable of processing incoming requests out of order to maximize + performance in the event of network failures or packet reordering. + +2.4. State Synchronization and Connection Timeouts + + An IKE endpoint is allowed to forget all of its state associated with + an IKE_SA and the collection of corresponding CHILD_SAs at any time. + This is the anticipated behavior in the event of an endpoint crash + and restart. It is important when an endpoint either fails or + reinitializes its state that the other endpoint detect those + conditions and not continue to waste network bandwidth by sending + packets over discarded SAs and having them fall into a black hole. + + Since IKE is designed to operate in spite of Denial of Service (DoS) + attacks from the network, an endpoint MUST NOT conclude that the + other endpoint has failed based on any routing information (e.g., + ICMP messages) or IKE messages that arrive without cryptographic + protection (e.g., Notify messages complaining about unknown SPIs). + An endpoint MUST conclude that the other endpoint has failed only + when repeated attempts to contact it have gone unanswered for a + timeout period or when a cryptographically protected INITIAL_CONTACT + notification is received on a different IKE_SA to the same + authenticated identity. An endpoint SHOULD suspect that the other + endpoint has failed based on routing information and initiate a + request to see whether the other endpoint is alive. To check whether + the other side is alive, IKE specifies an empty INFORMATIONAL message + + + +Kaufman Standards Track [Page 15] + +RFC 4306 IKEv2 December 2005 + + + that (like all IKE requests) requires an acknowledgement (note that + within the context of an IKE_SA, an "empty" message consists of an + IKE header followed by an Encrypted payload that contains no + payloads). If a cryptographically protected message has been + received from the other side recently, unprotected notifications MAY + be ignored. Implementations MUST limit the rate at which they take + actions based on unprotected messages. + + Numbers of retries and lengths of timeouts are not covered in this + specification because they do not affect interoperability. It is + suggested that messages be retransmitted at least a dozen times over + a period of at least several minutes before giving up on an SA, but + different environments may require different rules. To be a good + network citizen, retranmission times MUST increase exponentially to + avoid flooding the network and making an existing congestion + situation worse. If there has only been outgoing traffic on all of + the SAs associated with an IKE_SA, it is essential to confirm + liveness of the other endpoint to avoid black holes. If no + cryptographically protected messages have been received on an IKE_SA + or any of its CHILD_SAs recently, the system needs to perform a + liveness check in order to prevent sending messages to a dead peer. + Receipt of a fresh cryptographically protected message on an IKE_SA + or any of its CHILD_SAs ensures liveness of the IKE_SA and all of its + CHILD_SAs. Note that this places requirements on the failure modes + of an IKE endpoint. An implementation MUST NOT continue sending on + any SA if some failure prevents it from receiving on all of the + associated SAs. If CHILD_SAs can fail independently from one another + without the associated IKE_SA being able to send a delete message, + then they MUST be negotiated by separate IKE_SAs. + + There is a Denial of Service attack on the initiator of an IKE_SA + that can be avoided if the initiator takes the proper care. Since + the first two messages of an SA setup are not cryptographically + protected, an attacker could respond to the initiator's message + before the genuine responder and poison the connection setup attempt. + To prevent this, the initiator MAY be willing to accept multiple + responses to its first message, treat each as potentially legitimate, + respond to it, and then discard all the invalid half-open connections + when it receives a valid cryptographically protected response to any + one of its requests. Once a cryptographically valid response is + received, all subsequent responses should be ignored whether or not + they are cryptographically valid. + + Note that with these rules, there is no reason to negotiate and agree + upon an SA lifetime. If IKE presumes the partner is dead, based on + repeated lack of acknowledgement to an IKE message, then the IKE SA + and all CHILD_SAs set up through that IKE_SA are deleted. + + + + +Kaufman Standards Track [Page 16] + +RFC 4306 IKEv2 December 2005 + + + An IKE endpoint may at any time delete inactive CHILD_SAs to recover + resources used to hold their state. If an IKE endpoint chooses to + delete CHILD_SAs, it MUST send Delete payloads to the other end + notifying it of the deletion. It MAY similarly time out the IKE_SA. + Closing the IKE_SA implicitly closes all associated CHILD_SAs. In + this case, an IKE endpoint SHOULD send a Delete payload indicating + that it has closed the IKE_SA. + +2.5. Version Numbers and Forward Compatibility + + This document describes version 2.0 of IKE, meaning the major version + number is 2 and the minor version number is zero. It is likely that + some implementations will want to support both version 1.0 and + version 2.0, and in the future, other versions. + + The major version number should be incremented only if the packet + formats or required actions have changed so dramatically that an + older version node would not be able to interoperate with a newer + version node if it simply ignored the fields it did not understand + and took the actions specified in the older specification. The minor + version number indicates new capabilities, and MUST be ignored by a + node with a smaller minor version number, but used for informational + purposes by the node with the larger minor version number. For + example, it might indicate the ability to process a newly defined + notification message. The node with the larger minor version number + would simply note that its correspondent would not be able to + understand that message and therefore would not send it. + + If an endpoint receives a message with a higher major version number, + it MUST drop the message and SHOULD send an unauthenticated + notification message containing the highest version number it + supports. If an endpoint supports major version n, and major version + m, it MUST support all versions between n and m. If it receives a + message with a major version that it supports, it MUST respond with + that version number. In order to prevent two nodes from being + tricked into corresponding with a lower major version number than the + maximum that they both support, IKE has a flag that indicates that + the node is capable of speaking a higher major version number. + + Thus, the major version number in the IKE header indicates the + version number of the message, not the highest version number that + the transmitter supports. If the initiator is capable of speaking + versions n, n+1, and n+2, and the responder is capable of speaking + versions n and n+1, then they will negotiate speaking n+1, where the + initiator will set the flag indicating its ability to speak a higher + version. If they mistakenly (perhaps through an active attacker + + + + + +Kaufman Standards Track [Page 17] + +RFC 4306 IKEv2 December 2005 + + + sending error messages) negotiate to version n, then both will notice + that the other side can support a higher version number, and they + MUST break the connection and reconnect using version n+1. + + Note that IKEv1 does not follow these rules, because there is no way + in v1 of noting that you are capable of speaking a higher version + number. So an active attacker can trick two v2-capable nodes into + speaking v1. When a v2-capable node negotiates down to v1, it SHOULD + note that fact in its logs. + + Also for forward compatibility, all fields marked RESERVED MUST be + set to zero by a version 2.0 implementation and their content MUST be + ignored by a version 2.0 implementation ("Be conservative in what you + send and liberal in what you receive"). In this way, future versions + of the protocol can use those fields in a way that is guaranteed to + be ignored by implementations that do not understand them. + Similarly, payload types that are not defined are reserved for future + use; implementations of version 2.0 MUST skip over those payloads and + ignore their contents. + + IKEv2 adds a "critical" flag to each payload header for further + flexibility for forward compatibility. If the critical flag is set + and the payload type is unrecognized, the message MUST be rejected + and the response to the IKE request containing that payload MUST + include a Notify payload UNSUPPORTED_CRITICAL_PAYLOAD, indicating an + unsupported critical payload was included. If the critical flag is + not set and the payload type is unsupported, that payload MUST be + ignored. + + Although new payload types may be added in the future and may appear + interleaved with the fields defined in this specification, + implementations MUST send the payloads defined in this specification + in the order shown in the figures in section 2 and implementations + SHOULD reject as invalid a message with those payloads in any other + order. + +2.6. Cookies + + The term "cookies" originates with Karn and Simpson [RFC2522] in + Photuris, an early proposal for key management with IPsec, and it has + persisted. The Internet Security Association and Key Management + Protocol (ISAKMP) [MSST98] fixed message header includes two eight- + octet fields titled "cookies", and that syntax is used by both IKEv1 + and IKEv2 though in IKEv2 they are referred to as the IKE SPI and + there is a new separate field in a Notify payload holding the cookie. + The initial two eight-octet fields in the header are used as a + connection identifier at the beginning of IKE packets. Each endpoint + + + + +Kaufman Standards Track [Page 18] + +RFC 4306 IKEv2 December 2005 + + + chooses one of the two SPIs and SHOULD choose them so as to be unique + identifiers of an IKE_SA. An SPI value of zero is special and + indicates that the remote SPI value is not yet known by the sender. + + Unlike ESP and AH where only the recipient's SPI appears in the + header of a message, in IKE the sender's SPI is also sent in every + message. Since the SPI chosen by the original initiator of the + IKE_SA is always sent first, an endpoint with multiple IKE_SAs open + that wants to find the appropriate IKE_SA using the SPI it assigned + must look at the I(nitiator) Flag bit in the header to determine + whether it assigned the first or the second eight octets. + + In the first message of an initial IKE exchange, the initiator will + not know the responder's SPI value and will therefore set that field + to zero. + + An expected attack against IKE is state and CPU exhaustion, where the + target is flooded with session initiation requests from forged IP + addresses. This attack can be made less effective if an + implementation of a responder uses minimal CPU and commits no state + to an SA until it knows the initiator can receive packets at the + address from which it claims to be sending them. To accomplish this, + a responder SHOULD -- when it detects a large number of half-open + IKE_SAs -- reject initial IKE messages unless they contain a Notify + payload of type COOKIE. It SHOULD instead send an unprotected IKE + message as a response and include COOKIE Notify payload with the + cookie data to be returned. Initiators who receive such responses + MUST retry the IKE_SA_INIT with a Notify payload of type COOKIE + containing the responder supplied cookie data as the first payload + and all other payloads unchanged. The initial exchange will then be + as follows: + + Initiator Responder + ----------- ----------- + HDR(A,0), SAi1, KEi, Ni --> + + <-- HDR(A,0), N(COOKIE) + + HDR(A,0), N(COOKIE), SAi1, KEi, Ni --> + + <-- HDR(A,B), SAr1, KEr, Nr, [CERTREQ] + + HDR(A,B), SK {IDi, [CERT,] [CERTREQ,] [IDr,] + AUTH, SAi2, TSi, TSr} --> + + <-- HDR(A,B), SK {IDr, [CERT,] AUTH, + SAr2, TSi, TSr} + + + + +Kaufman Standards Track [Page 19] + +RFC 4306 IKEv2 December 2005 + + + The first two messages do not affect any initiator or responder state + except for communicating the cookie. In particular, the message + sequence numbers in the first four messages will all be zero and the + message sequence numbers in the last two messages will be one. 'A' is + the SPI assigned by the initiator, while 'B' is the SPI assigned by + the responder. + + An IKE implementation SHOULD implement its responder cookie + generation in such a way as to not require any saved state to + recognize its valid cookie when the second IKE_SA_INIT message + arrives. The exact algorithms and syntax they use to generate + cookies do not affect interoperability and hence are not specified + here. The following is an example of how an endpoint could use + cookies to implement limited DOS protection. + + A good way to do this is to set the responder cookie to be: + + Cookie = <VersionIDofSecret> | Hash(Ni | IPi | SPIi | <secret>) + + where <secret> is a randomly generated secret known only to the + responder and periodically changed and | indicates concatenation. + <VersionIDofSecret> should be changed whenever <secret> is + regenerated. The cookie can be recomputed when the IKE_SA_INIT + arrives the second time and compared to the cookie in the received + message. If it matches, the responder knows that the cookie was + generated since the last change to <secret> and that IPi must be the + same as the source address it saw the first time. Incorporating SPIi + into the calculation ensures that if multiple IKE_SAs are being set + up in parallel they will all get different cookies (assuming the + initiator chooses unique SPIi's). Incorporating Ni into the hash + ensures that an attacker who sees only message 2 can't successfully + forge a message 3. + + If a new value for <secret> is chosen while there are connections in + the process of being initialized, an IKE_SA_INIT might be returned + with other than the current <VersionIDofSecret>. The responder in + that case MAY reject the message by sending another response with a + new cookie or it MAY keep the old value of <secret> around for a + short time and accept cookies computed from either one. The + responder SHOULD NOT accept cookies indefinitely after <secret> is + changed, since that would defeat part of the denial of service + protection. The responder SHOULD change the value of <secret> + frequently, especially if under attack. + + + + + + + + +Kaufman Standards Track [Page 20] + +RFC 4306 IKEv2 December 2005 + + +2.7. Cryptographic Algorithm Negotiation + + The payload type known as "SA" indicates a proposal for a set of + choices of IPsec protocols (IKE, ESP, and/or AH) for the SA as well + as cryptographic algorithms associated with each protocol. + + An SA payload consists of one or more proposals. Each proposal + includes one or more protocols (usually one). Each protocol contains + one or more transforms -- each specifying a cryptographic algorithm. + Each transform contains zero or more attributes (attributes are + needed only if the transform identifier does not completely specify + the cryptographic algorithm). + + This hierarchical structure was designed to efficiently encode + proposals for cryptographic suites when the number of supported + suites is large because multiple values are acceptable for multiple + transforms. The responder MUST choose a single suite, which MAY be + any subset of the SA proposal following the rules below: + + Each proposal contains one or more protocols. If a proposal is + accepted, the SA response MUST contain the same protocols in the + same order as the proposal. The responder MUST accept a single + proposal or reject them all and return an error. (Example: if a + single proposal contains ESP and AH and that proposal is accepted, + both ESP and AH MUST be accepted. If ESP and AH are included in + separate proposals, the responder MUST accept only one of them). + + Each IPsec protocol proposal contains one or more transforms. + Each transform contains a transform type. The accepted + cryptographic suite MUST contain exactly one transform of each + type included in the proposal. For example: if an ESP proposal + includes transforms ENCR_3DES, ENCR_AES w/keysize 128, ENCR_AES + w/keysize 256, AUTH_HMAC_MD5, and AUTH_HMAC_SHA, the accepted + suite MUST contain one of the ENCR_ transforms and one of the + AUTH_ transforms. Thus, six combinations are acceptable. + + Since the initiator sends its Diffie-Hellman value in the + IKE_SA_INIT, it must guess the Diffie-Hellman group that the + responder will select from its list of supported groups. If the + initiator guesses wrong, the responder will respond with a Notify + payload of type INVALID_KE_PAYLOAD indicating the selected group. In + this case, the initiator MUST retry the IKE_SA_INIT with the + corrected Diffie-Hellman group. The initiator MUST again propose its + full set of acceptable cryptographic suites because the rejection + message was unauthenticated and otherwise an active attacker could + trick the endpoints into negotiating a weaker suite than a stronger + one that they both prefer. + + + + +Kaufman Standards Track [Page 21] + +RFC 4306 IKEv2 December 2005 + + +2.8. Rekeying + + IKE, ESP, and AH security associations use secret keys that SHOULD be + used only for a limited amount of time and to protect a limited + amount of data. This limits the lifetime of the entire security + association. When the lifetime of a security association expires, + the security association MUST NOT be used. If there is demand, new + security associations MAY be established. Reestablishment of + security associations to take the place of ones that expire is + referred to as "rekeying". + + To allow for minimal IPsec implementations, the ability to rekey SAs + without restarting the entire IKE_SA is optional. An implementation + MAY refuse all CREATE_CHILD_SA requests within an IKE_SA. If an SA + has expired or is about to expire and rekeying attempts using the + mechanisms described here fail, an implementation MUST close the + IKE_SA and any associated CHILD_SAs and then MAY start new ones. + Implementations SHOULD support in-place rekeying of SAs, since doing + so offers better performance and is likely to reduce the number of + packets lost during the transition. + + To rekey a CHILD_SA within an existing IKE_SA, create a new, + equivalent SA (see section 2.17 below), and when the new one is + established, delete the old one. To rekey an IKE_SA, establish a new + equivalent IKE_SA (see section 2.18 below) with the peer to whom the + old IKE_SA is shared using a CREATE_CHILD_SA within the existing + IKE_SA. An IKE_SA so created inherits all of the original IKE_SA's + CHILD_SAs. Use the new IKE_SA for all control messages needed to + maintain the CHILD_SAs created by the old IKE_SA, and delete the old + IKE_SA. The Delete payload to delete itself MUST be the last request + sent over an IKE_SA. + + SAs SHOULD be rekeyed proactively, i.e., the new SA should be + established before the old one expires and becomes unusable. Enough + time should elapse between the time the new SA is established and the + old one becomes unusable so that traffic can be switched over to the + new SA. + + A difference between IKEv1 and IKEv2 is that in IKEv1 SA lifetimes + were negotiated. In IKEv2, each end of the SA is responsible for + enforcing its own lifetime policy on the SA and rekeying the SA when + necessary. If the two ends have different lifetime policies, the end + with the shorter lifetime will end up always being the one to request + the rekeying. If an SA bundle has been inactive for a long time and + if an endpoint would not initiate the SA in the absence of traffic, + the endpoint MAY choose to close the SA instead of rekeying it when + its lifetime expires. It SHOULD do so if there has been no traffic + since the last time the SA was rekeyed. + + + +Kaufman Standards Track [Page 22] + +RFC 4306 IKEv2 December 2005 + + + If the two ends have the same lifetime policies, it is possible that + both will initiate a rekeying at the same time (which will result in + redundant SAs). To reduce the probability of this happening, the + timing of rekeying requests SHOULD be jittered (delayed by a random + amount of time after the need for rekeying is noticed). + + This form of rekeying may temporarily result in multiple similar SAs + between the same pairs of nodes. When there are two SAs eligible to + receive packets, a node MUST accept incoming packets through either + SA. If redundant SAs are created though such a collision, the SA + created with the lowest of the four nonces used in the two exchanges + SHOULD be closed by the endpoint that created it. + + Note that IKEv2 deliberately allows parallel SAs with the same + traffic selectors between common endpoints. One of the purposes of + this is to support traffic quality of service (QoS) differences among + the SAs (see [RFC2474], [RFC2475], and section 4.1 of [RFC2983]). + Hence unlike IKEv1, the combination of the endpoints and the traffic + selectors may not uniquely identify an SA between those endpoints, so + the IKEv1 rekeying heuristic of deleting SAs on the basis of + duplicate traffic selectors SHOULD NOT be used. + + The node that initiated the surviving rekeyed SA SHOULD delete the + replaced SA after the new one is established. + + There are timing windows -- particularly in the presence of lost + packets -- where endpoints may not agree on the state of an SA. The + responder to a CREATE_CHILD_SA MUST be prepared to accept messages on + an SA before sending its response to the creation request, so there + is no ambiguity for the initiator. The initiator MAY begin sending + on an SA as soon as it processes the response. The initiator, + however, cannot receive on a newly created SA until it receives and + processes the response to its CREATE_CHILD_SA request. How, then, is + the responder to know when it is OK to send on the newly created SA? + + From a technical correctness and interoperability perspective, the + responder MAY begin sending on an SA as soon as it sends its response + to the CREATE_CHILD_SA request. In some situations, however, this + could result in packets unnecessarily being dropped, so an + implementation MAY want to defer such sending. + + The responder can be assured that the initiator is prepared to + receive messages on an SA if either (1) it has received a + cryptographically valid message on the new SA, or (2) the new SA + rekeys an existing SA and it receives an IKE request to close the + replaced SA. When rekeying an SA, the responder SHOULD continue to + send messages on the old SA until one of those events occurs. When + establishing a new SA, the responder MAY defer sending messages on a + + + +Kaufman Standards Track [Page 23] + +RFC 4306 IKEv2 December 2005 + + + new SA until either it receives one or a timeout has occurred. If an + initiator receives a message on an SA for which it has not received a + response to its CREATE_CHILD_SA request, it SHOULD interpret that as + a likely packet loss and retransmit the CREATE_CHILD_SA request. An + initiator MAY send a dummy message on a newly created SA if it has no + messages queued in order to assure the responder that the initiator + is ready to receive messages. + +2.9. Traffic Selector Negotiation + + When an IP packet is received by an RFC4301-compliant IPsec subsystem + and matches a "protect" selector in its Security Policy Database + (SPD), the subsystem MUST protect that packet with IPsec. When no SA + exists yet, it is the task of IKE to create it. Maintenance of a + system's SPD is outside the scope of IKE (see [PFKEY] for an example + protocol), though some implementations might update their SPD in + connection with the running of IKE (for an example scenario, see + section 1.1.3). + + Traffic Selector (TS) payloads allow endpoints to communicate some of + the information from their SPD to their peers. TS payloads specify + the selection criteria for packets that will be forwarded over the + newly set up SA. This can serve as a consistency check in some + scenarios to assure that the SPDs are consistent. In others, it + guides the dynamic update of the SPD. + + Two TS payloads appear in each of the messages in the exchange that + creates a CHILD_SA pair. Each TS payload contains one or more + Traffic Selectors. Each Traffic Selector consists of an address + range (IPv4 or IPv6), a port range, and an IP protocol ID. In + support of the scenario described in section 1.1.3, an initiator may + request that the responder assign an IP address and tell the + initiator what it is. + + IKEv2 allows the responder to choose a subset of the traffic proposed + by the initiator. This could happen when the configurations of the + two endpoints are being updated but only one end has received the new + information. Since the two endpoints may be configured by different + people, the incompatibility may persist for an extended period even + in the absence of errors. It also allows for intentionally different + configurations, as when one end is configured to tunnel all addresses + and depends on the other end to have the up-to-date list. + + The first of the two TS payloads is known as TSi (Traffic Selector- + initiator). The second is known as TSr (Traffic Selector-responder). + TSi specifies the source address of traffic forwarded from (or the + destination address of traffic forwarded to) the initiator of the + CHILD_SA pair. TSr specifies the destination address of the traffic + + + +Kaufman Standards Track [Page 24] + +RFC 4306 IKEv2 December 2005 + + + forwarded to (or the source address of the traffic forwarded from) + the responder of the CHILD_SA pair. For example, if the original + initiator request the creation of a CHILD_SA pair, and wishes to + tunnel all traffic from subnet 192.0.1.* on the initiator's side to + subnet 192.0.2.* on the responder's side, the initiator would include + a single traffic selector in each TS payload. TSi would specify the + address range (192.0.1.0 - 192.0.1.255) and TSr would specify the + address range (192.0.2.0 - 192.0.2.255). Assuming that proposal was + acceptable to the responder, it would send identical TS payloads + back. (Note: The IP address range 192.0.2.* has been reserved for + use in examples in RFCs and similar documents. This document needed + two such ranges, and so also used 192.0.1.*. This should not be + confused with any actual address.) + + The responder is allowed to narrow the choices by selecting a subset + of the traffic, for instance by eliminating or narrowing the range of + one or more members of the set of traffic selectors, provided the set + does not become the NULL set. + + It is possible for the responder's policy to contain multiple smaller + ranges, all encompassed by the initiator's traffic selector, and with + the responder's policy being that each of those ranges should be sent + over a different SA. Continuing the example above, the responder + might have a policy of being willing to tunnel those addresses to and + from the initiator, but might require that each address pair be on a + separately negotiated CHILD_SA. If the initiator generated its + request in response to an incoming packet from 192.0.1.43 to + 192.0.2.123, there would be no way for the responder to determine + which pair of addresses should be included in this tunnel, and it + would have to make a guess or reject the request with a status of + SINGLE_PAIR_REQUIRED. + + To enable the responder to choose the appropriate range in this case, + if the initiator has requested the SA due to a data packet, the + initiator SHOULD include as the first traffic selector in each of TSi + and TSr a very specific traffic selector including the addresses in + the packet triggering the request. In the example, the initiator + would include in TSi two traffic selectors: the first containing the + address range (192.0.1.43 - 192.0.1.43) and the source port and IP + protocol from the packet and the second containing (192.0.1.0 - + 192.0.1.255) with all ports and IP protocols. The initiator would + similarly include two traffic selectors in TSr. + + If the responder's policy does not allow it to accept the entire set + of traffic selectors in the initiator's request, but does allow him + to accept the first selector of TSi and TSr, then the responder MUST + narrow the traffic selectors to a subset that includes the + + + + +Kaufman Standards Track [Page 25] + +RFC 4306 IKEv2 December 2005 + + + initiator's first choices. In this example, the responder might + respond with TSi being (192.0.1.43 - 192.0.1.43) with all ports and + IP protocols. + + If the initiator creates the CHILD_SA pair not in response to an + arriving packet, but rather, say, upon startup, then there may be no + specific addresses the initiator prefers for the initial tunnel over + any other. In that case, the first values in TSi and TSr MAY be + ranges rather than specific values, and the responder chooses a + subset of the initiator's TSi and TSr that are acceptable. If more + than one subset is acceptable but their union is not, the responder + MUST accept some subset and MAY include a Notify payload of type + ADDITIONAL_TS_POSSIBLE to indicate that the initiator might want to + try again. This case will occur only when the initiator and + responder are configured differently from one another. If the + initiator and responder agree on the granularity of tunnels, the + initiator will never request a tunnel wider than the responder will + accept. Such misconfigurations SHOULD be recorded in error logs. + +2.10. Nonces + + The IKE_SA_INIT messages each contain a nonce. These nonces are used + as inputs to cryptographic functions. The CREATE_CHILD_SA request + and the CREATE_CHILD_SA response also contain nonces. These nonces + are used to add freshness to the key derivation technique used to + obtain keys for CHILD_SA, and to ensure creation of strong pseudo- + random bits from the Diffie-Hellman key. Nonces used in IKEv2 MUST + be randomly chosen, MUST be at least 128 bits in size, and MUST be at + least half the key size of the negotiated prf. ("prf" refers to + "pseudo-random function", one of the cryptographic algorithms + negotiated in the IKE exchange.) If the same random number source is + used for both keys and nonces, care must be taken to ensure that the + latter use does not compromise the former. + +2.11. Address and Port Agility + + IKE runs over UDP ports 500 and 4500, and implicitly sets up ESP and + AH associations for the same IP addresses it runs over. The IP + addresses and ports in the outer header are, however, not themselves + cryptographically protected, and IKE is designed to work even through + Network Address Translation (NAT) boxes. An implementation MUST + accept incoming requests even if the source port is not 500 or 4500, + and MUST respond to the address and port from which the request was + received. It MUST specify the address and port at which the request + was received as the source address and port in the response. IKE + functions identically over IPv4 or IPv6. + + + + + +Kaufman Standards Track [Page 26] + +RFC 4306 IKEv2 December 2005 + + +2.12. Reuse of Diffie-Hellman Exponentials + + IKE generates keying material using an ephemeral Diffie-Hellman + exchange in order to gain the property of "perfect forward secrecy". + This means that once a connection is closed and its corresponding + keys are forgotten, even someone who has recorded all of the data + from the connection and gets access to all of the long-term keys of + the two endpoints cannot reconstruct the keys used to protect the + conversation without doing a brute force search of the session key + space. + + Achieving perfect forward secrecy requires that when a connection is + closed, each endpoint MUST forget not only the keys used by the + connection but also any information that could be used to recompute + those keys. In particular, it MUST forget the secrets used in the + Diffie-Hellman calculation and any state that may persist in the + state of a pseudo-random number generator that could be used to + recompute the Diffie-Hellman secrets. + + Since the computing of Diffie-Hellman exponentials is computationally + expensive, an endpoint may find it advantageous to reuse those + exponentials for multiple connection setups. There are several + reasonable strategies for doing this. An endpoint could choose a new + exponential only periodically though this could result in less-than- + perfect forward secrecy if some connection lasts for less than the + lifetime of the exponential. Or it could keep track of which + exponential was used for each connection and delete the information + associated with the exponential only when some corresponding + connection was closed. This would allow the exponential to be reused + without losing perfect forward secrecy at the cost of maintaining + more state. + + Decisions as to whether and when to reuse Diffie-Hellman exponentials + is a private decision in the sense that it will not affect + interoperability. An implementation that reuses exponentials MAY + choose to remember the exponential used by the other endpoint on past + exchanges and if one is reused to avoid the second half of the + calculation. + +2.13. Generating Keying Material + + In the context of the IKE_SA, four cryptographic algorithms are + negotiated: an encryption algorithm, an integrity protection + algorithm, a Diffie-Hellman group, and a pseudo-random function + (prf). The pseudo-random function is used for the construction of + keying material for all of the cryptographic algorithms used in both + the IKE_SA and the CHILD_SAs. + + + + +Kaufman Standards Track [Page 27] + +RFC 4306 IKEv2 December 2005 + + + We assume that each encryption algorithm and integrity protection + algorithm uses a fixed-size key and that any randomly chosen value of + that fixed size can serve as an appropriate key. For algorithms that + accept a variable length key, a fixed key size MUST be specified as + part of the cryptographic transform negotiated. For algorithms for + which not all values are valid keys (such as DES or 3DES with key + parity), the algorithm by which keys are derived from arbitrary + values MUST be specified by the cryptographic transform. For + integrity protection functions based on Hashed Message Authentication + Code (HMAC), the fixed key size is the size of the output of the + underlying hash function. When the prf function takes a variable + length key, variable length data, and produces a fixed-length output + (e.g., when using HMAC), the formulas in this document apply. When + the key for the prf function has fixed length, the data provided as a + key is truncated or padded with zeros as necessary unless exceptional + processing is explained following the formula. + + Keying material will always be derived as the output of the + negotiated prf algorithm. Since the amount of keying material needed + may be greater than the size of the output of the prf algorithm, we + will use the prf iteratively. We will use the terminology prf+ to + describe the function that outputs a pseudo-random stream based on + the inputs to a prf as follows: (where | indicates concatenation) + + prf+ (K,S) = T1 | T2 | T3 | T4 | ... + + where: + T1 = prf (K, S | 0x01) + T2 = prf (K, T1 | S | 0x02) + T3 = prf (K, T2 | S | 0x03) + T4 = prf (K, T3 | S | 0x04) + + continuing as needed to compute all required keys. The keys are + taken from the output string without regard to boundaries (e.g., if + the required keys are a 256-bit Advanced Encryption Standard (AES) + key and a 160-bit HMAC key, and the prf function generates 160 bits, + the AES key will come from T1 and the beginning of T2, while the HMAC + key will come from the rest of T2 and the beginning of T3). + + The constant concatenated to the end of each string feeding the prf + is a single octet. prf+ in this document is not defined beyond 255 + times the size of the prf output. + +2.14. Generating Keying Material for the IKE_SA + + The shared keys are computed as follows. A quantity called SKEYSEED + is calculated from the nonces exchanged during the IKE_SA_INIT + exchange and the Diffie-Hellman shared secret established during that + + + +Kaufman Standards Track [Page 28] + +RFC 4306 IKEv2 December 2005 + + + exchange. SKEYSEED is used to calculate seven other secrets: SK_d + used for deriving new keys for the CHILD_SAs established with this + IKE_SA; SK_ai and SK_ar used as a key to the integrity protection + algorithm for authenticating the component messages of subsequent + exchanges; SK_ei and SK_er used for encrypting (and of course + decrypting) all subsequent exchanges; and SK_pi and SK_pr, which are + used when generating an AUTH payload. + + SKEYSEED and its derivatives are computed as follows: + + SKEYSEED = prf(Ni | Nr, g^ir) + + {SK_d | SK_ai | SK_ar | SK_ei | SK_er | SK_pi | SK_pr } = prf+ + (SKEYSEED, Ni | Nr | SPIi | SPIr ) + + (indicating that the quantities SK_d, SK_ai, SK_ar, SK_ei, SK_er, + SK_pi, and SK_pr are taken in order from the generated bits of the + prf+). g^ir is the shared secret from the ephemeral Diffie-Hellman + exchange. g^ir is represented as a string of octets in big endian + order padded with zeros if necessary to make it the length of the + modulus. Ni and Nr are the nonces, stripped of any headers. If the + negotiated prf takes a fixed-length key and the lengths of Ni and Nr + do not add up to that length, half the bits must come from Ni and + half from Nr, taking the first bits of each. + + The two directions of traffic flow use different keys. The keys used + to protect messages from the original initiator are SK_ai and SK_ei. + The keys used to protect messages in the other direction are SK_ar + and SK_er. Each algorithm takes a fixed number of bits of keying + material, which is specified as part of the algorithm. For integrity + algorithms based on a keyed hash, the key size is always equal to the + length of the output of the underlying hash function. + +2.15. Authentication of the IKE_SA + + When not using extensible authentication (see section 2.16), the + peers are authenticated by having each sign (or MAC using a shared + secret as the key) a block of data. For the responder, the octets to + be signed start with the first octet of the first SPI in the header + of the second message and end with the last octet of the last payload + in the second message. Appended to this (for purposes of computing + the signature) are the initiator's nonce Ni (just the value, not the + payload containing it), and the value prf(SK_pr,IDr') where IDr' is + the responder's ID payload excluding the fixed header. Note that + neither the nonce Ni nor the value prf(SK_pr,IDr') are transmitted. + Similarly, the initiator signs the first message, starting with the + first octet of the first SPI in the header and ending with the last + octet of the last payload. Appended to this (for purposes of + + + +Kaufman Standards Track [Page 29] + +RFC 4306 IKEv2 December 2005 + + + computing the signature) are the responder's nonce Nr, and the value + prf(SK_pi,IDi'). In the above calculation, IDi' and IDr' are the + entire ID payloads excluding the fixed header. It is critical to the + security of the exchange that each side sign the other side's nonce. + + Note that all of the payloads are included under the signature, + including any payload types not defined in this document. If the + first message of the exchange is sent twice (the second time with a + responder cookie and/or a different Diffie-Hellman group), it is the + second version of the message that is signed. + + Optionally, messages 3 and 4 MAY include a certificate, or + certificate chain providing evidence that the key used to compute a + digital signature belongs to the name in the ID payload. The + signature or MAC will be computed using algorithms dictated by the + type of key used by the signer, and specified by the Auth Method + field in the Authentication payload. There is no requirement that + the initiator and responder sign with the same cryptographic + algorithms. The choice of cryptographic algorithms depends on the + type of key each has. In particular, the initiator may be using a + shared key while the responder may have a public signature key and + certificate. It will commonly be the case (but it is not required) + that if a shared secret is used for authentication that the same key + is used in both directions. Note that it is a common but typically + insecure practice to have a shared key derived solely from a user- + chosen password without incorporating another source of randomness. + + This is typically insecure because user-chosen passwords are unlikely + to have sufficient unpredictability to resist dictionary attacks and + these attacks are not prevented in this authentication method. + (Applications using password-based authentication for bootstrapping + and IKE_SA should use the authentication method in section 2.16, + which is designed to prevent off-line dictionary attacks.) The pre- + shared key SHOULD contain as much unpredictability as the strongest + key being negotiated. In the case of a pre-shared key, the AUTH + value is computed as: + + AUTH = prf(prf(Shared Secret,"Key Pad for IKEv2"), <msg octets>) + + where the string "Key Pad for IKEv2" is 17 ASCII characters without + null termination. The shared secret can be variable length. The pad + string is added so that if the shared secret is derived from a + password, the IKE implementation need not store the password in + cleartext, but rather can store the value prf(Shared Secret,"Key Pad + for IKEv2"), which could not be used as a password equivalent for + protocols other than IKEv2. As noted above, deriving the shared + secret from a password is not secure. This construction is used + because it is anticipated that people will do it anyway. The + + + +Kaufman Standards Track [Page 30] + +RFC 4306 IKEv2 December 2005 + + + management interface by which the Shared Secret is provided MUST + accept ASCII strings of at least 64 octets and MUST NOT add a null + terminator before using them as shared secrets. It MUST also accept + a HEX encoding of the Shared Secret. The management interface MAY + accept other encodings if the algorithm for translating the encoding + to a binary string is specified. If the negotiated prf takes a + fixed-size key, the shared secret MUST be of that fixed size. + +2.16. Extensible Authentication Protocol Methods + + In addition to authentication using public key signatures and shared + secrets, IKE supports authentication using methods defined in RFC + 3748 [EAP]. Typically, these methods are asymmetric (designed for a + user authenticating to a server), and they may not be mutual. For + this reason, these protocols are typically used to authenticate the + initiator to the responder and MUST be used in conjunction with a + public key signature based authentication of the responder to the + initiator. These methods are often associated with mechanisms + referred to as "Legacy Authentication" mechanisms. + + While this memo references [EAP] with the intent that new methods can + be added in the future without updating this specification, some + simpler variations are documented here and in section 3.16. [EAP] + defines an authentication protocol requiring a variable number of + messages. Extensible Authentication is implemented in IKE as + additional IKE_AUTH exchanges that MUST be completed in order to + initialize the IKE_SA. + + An initiator indicates a desire to use extensible authentication by + leaving out the AUTH payload from message 3. By including an IDi + payload but not an AUTH payload, the initiator has declared an + identity but has not proven it. If the responder is willing to use + an extensible authentication method, it will place an Extensible + Authentication Protocol (EAP) payload in message 4 and defer sending + SAr2, TSi, and TSr until initiator authentication is complete in a + subsequent IKE_AUTH exchange. In the case of a minimal extensible + authentication, the initial SA establishment will appear as follows: + + + + + + + + + + + + + + +Kaufman Standards Track [Page 31] + +RFC 4306 IKEv2 December 2005 + + + Initiator Responder + ----------- ----------- + HDR, SAi1, KEi, Ni --> + + <-- HDR, SAr1, KEr, Nr, [CERTREQ] + + HDR, SK {IDi, [CERTREQ,] [IDr,] + SAi2, TSi, TSr} --> + + <-- HDR, SK {IDr, [CERT,] AUTH, + EAP } + + HDR, SK {EAP} --> + + <-- HDR, SK {EAP (success)} + + HDR, SK {AUTH} --> + + <-- HDR, SK {AUTH, SAr2, TSi, TSr } + + For EAP methods that create a shared key as a side effect of + authentication, that shared key MUST be used by both the initiator + and responder to generate AUTH payloads in messages 7 and 8 using the + syntax for shared secrets specified in section 2.15. The shared key + from EAP is the field from the EAP specification named MSK. The + shared key generated during an IKE exchange MUST NOT be used for any + other purpose. + + EAP methods that do not establish a shared key SHOULD NOT be used, as + they are subject to a number of man-in-the-middle attacks [EAPMITM] + if these EAP methods are used in other protocols that do not use a + server-authenticated tunnel. Please see the Security Considerations + section for more details. If EAP methods that do not generate a + shared key are used, the AUTH payloads in messages 7 and 8 MUST be + generated using SK_pi and SK_pr, respectively. + + The initiator of an IKE_SA using EAP SHOULD be capable of extending + the initial protocol exchange to at least ten IKE_AUTH exchanges in + the event the responder sends notification messages and/or retries + the authentication prompt. Once the protocol exchange defined by the + chosen EAP authentication method has successfully terminated, the + responder MUST send an EAP payload containing the Success message. + Similarly, if the authentication method has failed, the responder + MUST send an EAP payload containing the Failure message. The + responder MAY at any time terminate the IKE exchange by sending an + EAP payload containing the Failure message. + + + + + +Kaufman Standards Track [Page 32] + +RFC 4306 IKEv2 December 2005 + + + Following such an extended exchange, the EAP AUTH payloads MUST be + included in the two messages following the one containing the EAP + Success message. + +2.17. Generating Keying Material for CHILD_SAs + + A single CHILD_SA is created by the IKE_AUTH exchange, and additional + CHILD_SAs can optionally be created in CREATE_CHILD_SA exchanges. + Keying material for them is generated as follows: + + KEYMAT = prf+(SK_d, Ni | Nr) + + Where Ni and Nr are the nonces from the IKE_SA_INIT exchange if this + request is the first CHILD_SA created or the fresh Ni and Nr from the + CREATE_CHILD_SA exchange if this is a subsequent creation. + + For CREATE_CHILD_SA exchanges including an optional Diffie-Hellman + exchange, the keying material is defined as: + + KEYMAT = prf+(SK_d, g^ir (new) | Ni | Nr ) + + where g^ir (new) is the shared secret from the ephemeral Diffie- + Hellman exchange of this CREATE_CHILD_SA exchange (represented as an + octet string in big endian order padded with zeros in the high-order + bits if necessary to make it the length of the modulus). + + A single CHILD_SA negotiation may result in multiple security + associations. ESP and AH SAs exist in pairs (one in each direction), + and four SAs could be created in a single CHILD_SA negotiation if a + combination of ESP and AH is being negotiated. + + Keying material MUST be taken from the expanded KEYMAT in the + following order: + + All keys for SAs carrying data from the initiator to the responder + are taken before SAs going in the reverse direction. + + If multiple IPsec protocols are negotiated, keying material is + taken in the order in which the protocol headers will appear in + the encapsulated packet. + + If a single protocol has both encryption and authentication keys, + the encryption key is taken from the first octets of KEYMAT and + the authentication key is taken from the next octets. + + Each cryptographic algorithm takes a fixed number of bits of keying + material specified as part of the algorithm. + + + + +Kaufman Standards Track [Page 33] + +RFC 4306 IKEv2 December 2005 + + +2.18. Rekeying IKE_SAs Using a CREATE_CHILD_SA exchange + + The CREATE_CHILD_SA exchange can be used to rekey an existing IKE_SA + (see section 2.8). New initiator and responder SPIs are supplied in + the SPI fields. The TS payloads are omitted when rekeying an IKE_SA. + SKEYSEED for the new IKE_SA is computed using SK_d from the existing + IKE_SA as follows: + + SKEYSEED = prf(SK_d (old), [g^ir (new)] | Ni | Nr) + + where g^ir (new) is the shared secret from the ephemeral Diffie- + Hellman exchange of this CREATE_CHILD_SA exchange (represented as an + octet string in big endian order padded with zeros if necessary to + make it the length of the modulus) and Ni and Nr are the two nonces + stripped of any headers. + + The new IKE_SA MUST reset its message counters to 0. + + SK_d, SK_ai, SK_ar, SK_ei, and SK_er are computed from SKEYSEED as + specified in section 2.14. + +2.19. Requesting an Internal Address on a Remote Network + + Most commonly occurring in the endpoint-to-security-gateway scenario, + an endpoint may need an IP address in the network protected by the + security gateway and may need to have that address dynamically + assigned. A request for such a temporary address can be included in + any request to create a CHILD_SA (including the implicit request in + message 3) by including a CP payload. + + This function provides address allocation to an IPsec Remote Access + Client (IRAC) trying to tunnel into a network protected by an IPsec + Remote Access Server (IRAS). Since the IKE_AUTH exchange creates an + IKE_SA and a CHILD_SA, the IRAC MUST request the IRAS-controlled + address (and optionally other information concerning the protected + network) in the IKE_AUTH exchange. The IRAS may procure an address + for the IRAC from any number of sources such as a DHCP/BOOTP server + or its own address pool. + + Initiator Responder + ----------------------------- --------------------------- + HDR, SK {IDi, [CERT,] [CERTREQ,] + [IDr,] AUTH, CP(CFG_REQUEST), + SAi2, TSi, TSr} --> + + <-- HDR, SK {IDr, [CERT,] AUTH, + CP(CFG_REPLY), SAr2, + TSi, TSr} + + + +Kaufman Standards Track [Page 34] + +RFC 4306 IKEv2 December 2005 + + + In all cases, the CP payload MUST be inserted before the SA payload. + In variations of the protocol where there are multiple IKE_AUTH + exchanges, the CP payloads MUST be inserted in the messages + containing the SA payloads. + + CP(CFG_REQUEST) MUST contain at least an INTERNAL_ADDRESS attribute + (either IPv4 or IPv6) but MAY contain any number of additional + attributes the initiator wants returned in the response. + + For example, message from initiator to responder: + CP(CFG_REQUEST)= + INTERNAL_ADDRESS(0.0.0.0) + INTERNAL_NETMASK(0.0.0.0) + INTERNAL_DNS(0.0.0.0) + TSi = (0, 0-65535,0.0.0.0-255.255.255.255) + TSr = (0, 0-65535,0.0.0.0-255.255.255.255) + + NOTE: Traffic Selectors contain (protocol, port range, address + range). + + Message from responder to initiator: + + CP(CFG_REPLY)= + INTERNAL_ADDRESS(192.0.2.202) + INTERNAL_NETMASK(255.255.255.0) + INTERNAL_SUBNET(192.0.2.0/255.255.255.0) + TSi = (0, 0-65535,192.0.2.202-192.0.2.202) + TSr = (0, 0-65535,192.0.2.0-192.0.2.255) + + All returned values will be implementation dependent. As can be seen + in the above example, the IRAS MAY also send other attributes that + were not included in CP(CFG_REQUEST) and MAY ignore the non-mandatory + attributes that it does not support. + + The responder MUST NOT send a CFG_REPLY without having first received + a CP(CFG_REQUEST) from the initiator, because we do not want the IRAS + to perform an unnecessary configuration lookup if the IRAC cannot + process the REPLY. In the case where the IRAS's configuration + requires that CP be used for a given identity IDi, but IRAC has + failed to send a CP(CFG_REQUEST), IRAS MUST fail the request, and + terminate the IKE exchange with a FAILED_CP_REQUIRED error. + +2.20. Requesting the Peer's Version + + An IKE peer wishing to inquire about the other peer's IKE software + version information MAY use the method below. This is an example of + a configuration request within an INFORMATIONAL exchange, after the + IKE_SA and first CHILD_SA have been created. + + + +Kaufman Standards Track [Page 35] + +RFC 4306 IKEv2 December 2005 + + + An IKE implementation MAY decline to give out version information + prior to authentication or even after authentication to prevent + trolling in case some implementation is known to have some security + weakness. In that case, it MUST either return an empty string or no + CP payload if CP is not supported. + + Initiator Responder + ----------------------------- -------------------------- + HDR, SK{CP(CFG_REQUEST)} --> + <-- HDR, SK{CP(CFG_REPLY)} + + CP(CFG_REQUEST)= + APPLICATION_VERSION("") + + CP(CFG_REPLY) APPLICATION_VERSION("foobar v1.3beta, (c) Foo Bar + Inc.") + +2.21. Error Handling + + There are many kinds of errors that can occur during IKE processing. + If a request is received that is badly formatted or unacceptable for + reasons of policy (e.g., no matching cryptographic algorithms), the + response MUST contain a Notify payload indicating the error. If an + error occurs outside the context of an IKE request (e.g., the node is + getting ESP messages on a nonexistent SPI), the node SHOULD initiate + an INFORMATIONAL exchange with a Notify payload describing the + problem. + + Errors that occur before a cryptographically protected IKE_SA is + established must be handled very carefully. There is a trade-off + between wanting to be helpful in diagnosing a problem and responding + to it and wanting to avoid being a dupe in a denial of service attack + based on forged messages. + + If a node receives a message on UDP port 500 or 4500 outside the + context of an IKE_SA known to it (and not a request to start one), it + may be the result of a recent crash of the node. If the message is + marked as a response, the node MAY audit the suspicious event but + MUST NOT respond. If the message is marked as a request, the node + MAY audit the suspicious event and MAY send a response. If a + response is sent, the response MUST be sent to the IP address and + port from whence it came with the same IKE SPIs and the Message ID + copied. The response MUST NOT be cryptographically protected and + MUST contain a Notify payload indicating INVALID_IKE_SPI. + + A node receiving such an unprotected Notify payload MUST NOT respond + and MUST NOT change the state of any existing SAs. The message might + be a forgery or might be a response the genuine correspondent was + + + +Kaufman Standards Track [Page 36] + +RFC 4306 IKEv2 December 2005 + + + tricked into sending. A node SHOULD treat such a message (and also a + network message like ICMP destination unreachable) as a hint that + there might be problems with SAs to that IP address and SHOULD + initiate a liveness test for any such IKE_SA. An implementation + SHOULD limit the frequency of such tests to avoid being tricked into + participating in a denial of service attack. + + A node receiving a suspicious message from an IP address with which + it has an IKE_SA MAY send an IKE Notify payload in an IKE + INFORMATIONAL exchange over that SA. The recipient MUST NOT change + the state of any SA's as a result but SHOULD audit the event to aid + in diagnosing malfunctions. A node MUST limit the rate at which it + will send messages in response to unprotected messages. + +2.22. IPComp + + Use of IP compression [IPCOMP] can be negotiated as part of the setup + of a CHILD_SA. While IP compression involves an extra header in each + packet and a compression parameter index (CPI), the virtual + "compression association" has no life outside the ESP or AH SA that + contains it. Compression associations disappear when the + corresponding ESP or AH SA goes away. It is not explicitly mentioned + in any DELETE payload. + + Negotiation of IP compression is separate from the negotiation of + cryptographic parameters associated with a CHILD_SA. A node + requesting a CHILD_SA MAY advertise its support for one or more + compression algorithms through one or more Notify payloads of type + IPCOMP_SUPPORTED. The response MAY indicate acceptance of a single + compression algorithm with a Notify payload of type IPCOMP_SUPPORTED. + These payloads MUST NOT occur in messages that do not contain SA + payloads. + + Although there has been discussion of allowing multiple compression + algorithms to be accepted and to have different compression + algorithms available for the two directions of a CHILD_SA, + implementations of this specification MUST NOT accept an IPComp + algorithm that was not proposed, MUST NOT accept more than one, and + MUST NOT compress using an algorithm other than one proposed and + accepted in the setup of the CHILD_SA. + + A side effect of separating the negotiation of IPComp from + cryptographic parameters is that it is not possible to propose + multiple cryptographic suites and propose IP compression with some of + them but not others. + + + + + + +Kaufman Standards Track [Page 37] + +RFC 4306 IKEv2 December 2005 + + +2.23. NAT Traversal + + Network Address Translation (NAT) gateways are a controversial + subject. This section briefly describes what they are and how they + are likely to act on IKE traffic. Many people believe that NATs are + evil and that we should not design our protocols so as to make them + work better. IKEv2 does specify some unintuitive processing rules in + order that NATs are more likely to work. + + NATs exist primarily because of the shortage of IPv4 addresses, + though there are other rationales. IP nodes that are "behind" a NAT + have IP addresses that are not globally unique, but rather are + assigned from some space that is unique within the network behind the + NAT but that are likely to be reused by nodes behind other NATs. + Generally, nodes behind NATs can communicate with other nodes behind + the same NAT and with nodes with globally unique addresses, but not + with nodes behind other NATs. There are exceptions to that rule. + When those nodes make connections to nodes on the real Internet, the + NAT gateway "translates" the IP source address to an address that + will be routed back to the gateway. Messages to the gateway from the + Internet have their destination addresses "translated" to the + internal address that will route the packet to the correct endnode. + + NATs are designed to be "transparent" to endnodes. Neither software + on the node behind the NAT nor the node on the Internet requires + modification to communicate through the NAT. Achieving this + transparency is more difficult with some protocols than with others. + Protocols that include IP addresses of the endpoints within the + payloads of the packet will fail unless the NAT gateway understands + the protocol and modifies the internal references as well as those in + the headers. Such knowledge is inherently unreliable, is a network + layer violation, and often results in subtle problems. + + Opening an IPsec connection through a NAT introduces special + problems. If the connection runs in transport mode, changing the IP + addresses on packets will cause the checksums to fail and the NAT + cannot correct the checksums because they are cryptographically + protected. Even in tunnel mode, there are routing problems because + transparently translating the addresses of AH and ESP packets + requires special logic in the NAT and that logic is heuristic and + unreliable in nature. For that reason, IKEv2 can negotiate UDP + encapsulation of IKE and ESP packets. This encoding is slightly less + efficient but is easier for NATs to process. In addition, firewalls + may be configured to pass IPsec traffic over UDP but not ESP/AH or + vice versa. + + + + + + +Kaufman Standards Track [Page 38] + +RFC 4306 IKEv2 December 2005 + + + It is a common practice of NATs to translate TCP and UDP port numbers + as well as addresses and use the port numbers of inbound packets to + decide which internal node should get a given packet. For this + reason, even though IKE packets MUST be sent from and to UDP port + 500, they MUST be accepted coming from any port and responses MUST be + sent to the port from whence they came. This is because the ports + may be modified as the packets pass through NATs. Similarly, IP + addresses of the IKE endpoints are generally not included in the IKE + payloads because the payloads are cryptographically protected and + could not be transparently modified by NATs. + + Port 4500 is reserved for UDP-encapsulated ESP and IKE. When working + through a NAT, it is generally better to pass IKE packets over port + 4500 because some older NATs handle IKE traffic on port 500 cleverly + in an attempt to transparently establish IPsec connections between + endpoints that don't handle NAT traversal themselves. Such NATs may + interfere with the straightforward NAT traversal envisioned by this + document, so an IPsec endpoint that discovers a NAT between it and + its correspondent MUST send all subsequent traffic to and from port + 4500, which NATs should not treat specially (as they might with port + 500). + + The specific requirements for supporting NAT traversal [RFC3715] are + listed below. Support for NAT traversal is optional. In this + section only, requirements listed as MUST apply only to + implementations supporting NAT traversal. + + IKE MUST listen on port 4500 as well as port 500. IKE MUST + respond to the IP address and port from which packets arrived. + + Both IKE initiator and responder MUST include in their IKE_SA_INIT + packets Notify payloads of type NAT_DETECTION_SOURCE_IP and + NAT_DETECTION_DESTINATION_IP. Those payloads can be used to + detect if there is NAT between the hosts, and which end is behind + the NAT. The location of the payloads in the IKE_SA_INIT packets + are just after the Ni and Nr payloads (before the optional CERTREQ + payload). + + If none of the NAT_DETECTION_SOURCE_IP payload(s) received matches + the hash of the source IP and port found from the IP header of the + packet containing the payload, it means that the other end is + behind NAT (i.e., someone along the route changed the source + address of the original packet to match the address of the NAT + box). In this case, this end should allow dynamic update of the + other ends IP address, as described later. + + + + + + +Kaufman Standards Track [Page 39] + +RFC 4306 IKEv2 December 2005 + + + If the NAT_DETECTION_DESTINATION_IP payload received does not + match the hash of the destination IP and port found from the IP + header of the packet containing the payload, it means that this + end is behind a NAT. In this case, this end SHOULD start sending + keepalive packets as explained in [Hutt05]. + + The IKE initiator MUST check these payloads if present and if they + do not match the addresses in the outer packet MUST tunnel all + future IKE and ESP packets associated with this IKE_SA over UDP + port 4500. + + To tunnel IKE packets over UDP port 4500, the IKE header has four + octets of zero prepended and the result immediately follows the + UDP header. To tunnel ESP packets over UDP port 4500, the ESP + header immediately follows the UDP header. Since the first four + bytes of the ESP header contain the SPI, and the SPI cannot + validly be zero, it is always possible to distinguish ESP and IKE + messages. + + The original source and destination IP address required for the + transport mode TCP and UDP packet checksum fixup (see [Hutt05]) + are obtained from the Traffic Selectors associated with the + exchange. In the case of NAT traversal, the Traffic Selectors + MUST contain exactly one IP address, which is then used as the + original IP address. + + There are cases where a NAT box decides to remove mappings that + are still alive (for example, the keepalive interval is too long, + or the NAT box is rebooted). To recover in these cases, hosts + that are not behind a NAT SHOULD send all packets (including + retransmission packets) to the IP address and port from the last + valid authenticated packet from the other end (i.e., dynamically + update the address). A host behind a NAT SHOULD NOT do this + because it opens a DoS attack possibility. Any authenticated IKE + packet or any authenticated UDP-encapsulated ESP packet can be + used to detect that the IP address or the port has changed. + + Note that similar but probably not identical actions will likely + be needed to make IKE work with Mobile IP, but such processing is + not addressed by this document. + +2.24. Explicit Congestion Notification (ECN) + + When IPsec tunnels behave as originally specified in [RFC2401], ECN + usage is not appropriate for the outer IP headers because tunnel + decapsulation processing discards ECN congestion indications to the + detriment of the network. ECN support for IPsec tunnels for IKEv1- + based IPsec requires multiple operating modes and negotiation (see + + + +Kaufman Standards Track [Page 40] + +RFC 4306 IKEv2 December 2005 + + + [RFC3168]). IKEv2 simplifies this situation by requiring that ECN be + usable in the outer IP headers of all tunnel-mode IPsec SAs created + by IKEv2. Specifically, tunnel encapsulators and decapsulators for + all tunnel-mode SAs created by IKEv2 MUST support the ECN full- + functionality option for tunnels specified in [RFC3168] and MUST + implement the tunnel encapsulation and decapsulation processing + specified in [RFC4301] to prevent discarding of ECN congestion + indications. + +3. Header and Payload Formats + +3.1. The IKE Header + + IKE messages use UDP ports 500 and/or 4500, with one IKE message per + UDP datagram. Information from the beginning of the packet through + the UDP header is largely ignored except that the IP addresses and + UDP ports from the headers are reversed and used for return packets. + When sent on UDP port 500, IKE messages begin immediately following + the UDP header. When sent on UDP port 4500, IKE messages have + prepended four octets of zero. These four octets of zero are not + part of the IKE message and are not included in any of the length + fields or checksums defined by IKE. Each IKE message begins with the + IKE header, denoted HDR in this memo. Following the header are one + or more IKE payloads each identified by a "Next Payload" field in the + preceding payload. Payloads are processed in the order in which they + appear in an IKE message by invoking the appropriate processing + routine according to the "Next Payload" field in the IKE header and + subsequently according to the "Next Payload" field in the IKE payload + itself until a "Next Payload" field of zero indicates that no + payloads follow. If a payload of type "Encrypted" is found, that + payload is decrypted and its contents parsed as additional payloads. + An Encrypted payload MUST be the last payload in a packet and an + Encrypted payload MUST NOT contain another Encrypted payload. + + The Recipient SPI in the header identifies an instance of an IKE + security association. It is therefore possible for a single instance + of IKE to multiplex distinct sessions with multiple peers. + + All multi-octet fields representing integers are laid out in big + endian order (aka most significant byte first, or network byte + order). + + The format of the IKE header is shown in Figure 4. + + + + + + + + +Kaufman Standards Track [Page 41] + +RFC 4306 IKEv2 December 2005 + + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! IKE_SA Initiator's SPI ! + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! IKE_SA Responder's SPI ! + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload ! MjVer ! MnVer ! Exchange Type ! Flags ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Message ID ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 4: IKE Header Format + + o Initiator's SPI (8 octets) - A value chosen by the + initiator to identify a unique IKE security association. This + value MUST NOT be zero. + + o Responder's SPI (8 octets) - A value chosen by the + responder to identify a unique IKE security association. This + value MUST be zero in the first message of an IKE Initial + Exchange (including repeats of that message including a + cookie) and MUST NOT be zero in any other message. + + o Next Payload (1 octet) - Indicates the type of payload that + immediately follows the header. The format and value of each + payload are defined below. + + o Major Version (4 bits) - Indicates the major version of the IKE + protocol in use. Implementations based on this version of IKE + MUST set the Major Version to 2. Implementations based on + previous versions of IKE and ISAKMP MUST set the Major Version + to 1. Implementations based on this version of IKE MUST reject + or ignore messages containing a version number greater than + 2. + + o Minor Version (4 bits) - Indicates the minor version of the + IKE protocol in use. Implementations based on this version of + IKE MUST set the Minor Version to 0. They MUST ignore the + minor version number of received messages. + + o Exchange Type (1 octet) - Indicates the type of exchange being + used. This constrains the payloads sent in each message and + orderings of messages in an exchange. + + + +Kaufman Standards Track [Page 42] + +RFC 4306 IKEv2 December 2005 + + + Exchange Type Value + + RESERVED 0-33 + IKE_SA_INIT 34 + IKE_AUTH 35 + CREATE_CHILD_SA 36 + INFORMATIONAL 37 + RESERVED TO IANA 38-239 + Reserved for private use 240-255 + + o Flags (1 octet) - Indicates specific options that are set + for the message. Presence of options are indicated by the + appropriate bit in the flags field being set. The bits are + defined LSB first, so bit 0 would be the least significant + bit of the Flags octet. In the description below, a bit + being 'set' means its value is '1', while 'cleared' means + its value is '0'. + + -- X(reserved) (bits 0-2) - These bits MUST be cleared + when sending and MUST be ignored on receipt. + + -- I(nitiator) (bit 3 of Flags) - This bit MUST be set in + messages sent by the original initiator of the IKE_SA + and MUST be cleared in messages sent by the original + responder. It is used by the recipient to determine + which eight octets of the SPI were generated by the + recipient. + + -- V(ersion) (bit 4 of Flags) - This bit indicates that + the transmitter is capable of speaking a higher major + version number of the protocol than the one indicated + in the major version number field. Implementations of + IKEv2 must clear this bit when sending and MUST ignore + it in incoming messages. + + -- R(esponse) (bit 5 of Flags) - This bit indicates that + this message is a response to a message containing + the same message ID. This bit MUST be cleared in all + request messages and MUST be set in all responses. + An IKE endpoint MUST NOT generate a response to a + message that is marked as being a response. + + -- X(reserved) (bits 6-7 of Flags) - These bits MUST be + cleared when sending and MUST be ignored on receipt. + + + + + + + +Kaufman Standards Track [Page 43] + +RFC 4306 IKEv2 December 2005 + + + o Message ID (4 octets) - Message identifier used to control + retransmission of lost packets and matching of requests and + responses. It is essential to the security of the protocol + because it is used to prevent message replay attacks. + See sections 2.1 and 2.2. + + o Length (4 octets) - Length of total message (header + payloads) + in octets. + +3.2. Generic Payload Header + + Each IKE payload defined in sections 3.3 through 3.16 begins with a + generic payload header, shown in Figure 5. Figures for each payload + below will include the generic payload header, but for brevity the + description of each field will be omitted. + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 5: Generic Payload Header + + The Generic Payload Header fields are defined as follows: + + o Next Payload (1 octet) - Identifier for the payload type of the + next payload in the message. If the current payload is the last + in the message, then this field will be 0. This field provides a + "chaining" capability whereby additional payloads can be added to + a message by appending it to the end of the message and setting + the "Next Payload" field of the preceding payload to indicate the + new payload's type. An Encrypted payload, which must always be + the last payload of a message, is an exception. It contains data + structures in the format of additional payloads. In the header of + an Encrypted payload, the Next Payload field is set to the payload + type of the first contained payload (instead of 0). + + Payload Type Values + + Next Payload Type Notation Value + + No Next Payload 0 + + RESERVED 1-32 + Security Association SA 33 + Key Exchange KE 34 + Identification - Initiator IDi 35 + + + +Kaufman Standards Track [Page 44] + +RFC 4306 IKEv2 December 2005 + + + Identification - Responder IDr 36 + Certificate CERT 37 + Certificate Request CERTREQ 38 + Authentication AUTH 39 + Nonce Ni, Nr 40 + Notify N 41 + Delete D 42 + Vendor ID V 43 + Traffic Selector - Initiator TSi 44 + Traffic Selector - Responder TSr 45 + Encrypted E 46 + Configuration CP 47 + Extensible Authentication EAP 48 + RESERVED TO IANA 49-127 + PRIVATE USE 128-255 + + Payload type values 1-32 should not be used so that there is no + overlap with the code assignments for IKEv1. Payload type values + 49-127 are reserved to IANA for future assignment in IKEv2 (see + section 6). Payload type values 128-255 are for private use among + mutually consenting parties. + + o Critical (1 bit) - MUST be set to zero if the sender wants the + recipient to skip this payload if it does not understand the + payload type code in the Next Payload field of the previous + payload. MUST be set to one if the sender wants the recipient to + reject this entire message if it does not understand the payload + type. MUST be ignored by the recipient if the recipient + understands the payload type code. MUST be set to zero for + payload types defined in this document. Note that the critical + bit applies to the current payload rather than the "next" payload + whose type code appears in the first octet. The reasoning behind + not setting the critical bit for payloads defined in this document + is that all implementations MUST understand all payload types + defined in this document and therefore must ignore the Critical + bit's value. Skipped payloads are expected to have valid Next + Payload and Payload Length fields. + + o RESERVED (7 bits) - MUST be sent as zero; MUST be ignored on + receipt. + + o Payload Length (2 octets) - Length in octets of the current + payload, including the generic payload header. + + + + + + + + +Kaufman Standards Track [Page 45] + +RFC 4306 IKEv2 December 2005 + + +3.3. Security Association Payload + + The Security Association Payload, denoted SA in this memo, is used to + negotiate attributes of a security association. Assembly of Security + Association Payloads requires great peace of mind. An SA payload MAY + contain multiple proposals. If there is more than one, they MUST be + ordered from most preferred to least preferred. Each proposal may + contain multiple IPsec protocols (where a protocol is IKE, ESP, or + AH), each protocol MAY contain multiple transforms, and each + transform MAY contain multiple attributes. When parsing an SA, an + implementation MUST check that the total Payload Length is consistent + with the payload's internal lengths and counts. Proposals, + Transforms, and Attributes each have their own variable length + encodings. They are nested such that the Payload Length of an SA + includes the combined contents of the SA, Proposal, Transform, and + Attribute information. The length of a Proposal includes the lengths + of all Transforms and Attributes it contains. The length of a + Transform includes the lengths of all Attributes it contains. + + The syntax of Security Associations, Proposals, Transforms, and + Attributes is based on ISAKMP; however, the semantics are somewhat + different. The reason for the complexity and the hierarchy is to + allow for multiple possible combinations of algorithms to be encoded + in a single SA. Sometimes there is a choice of multiple algorithms, + whereas other times there is a combination of algorithms. For + example, an initiator might want to propose using (AH w/MD5 and ESP + w/3DES) OR (ESP w/MD5 and 3DES). + + One of the reasons the semantics of the SA payload has changed from + ISAKMP and IKEv1 is to make the encodings more compact in common + cases. + + The Proposal structure contains within it a Proposal # and an IPsec + protocol ID. Each structure MUST have the same Proposal # as the + previous one or be one (1) greater. The first Proposal MUST have a + Proposal # of one (1). If two successive structures have the same + Proposal number, it means that the proposal consists of the first + structure AND the second. So a proposal of AH AND ESP would have two + proposal structures, one for AH and one for ESP and both would have + Proposal #1. A proposal of AH OR ESP would have two proposal + structures, one for AH with Proposal #1 and one for ESP with Proposal + #2. + + Each Proposal/Protocol structure is followed by one or more transform + structures. The number of different transforms is generally + determined by the Protocol. AH generally has a single transform: an + integrity check algorithm. ESP generally has two: an encryption + algorithm and an integrity check algorithm. IKE generally has four + + + +Kaufman Standards Track [Page 46] + +RFC 4306 IKEv2 December 2005 + + + transforms: a Diffie-Hellman group, an integrity check algorithm, a + prf algorithm, and an encryption algorithm. If an algorithm that + combines encryption and integrity protection is proposed, it MUST be + proposed as an encryption algorithm and an integrity protection + algorithm MUST NOT be proposed. For each Protocol, the set of + permissible transforms is assigned transform ID numbers, which appear + in the header of each transform. + + If there are multiple transforms with the same Transform Type, the + proposal is an OR of those transforms. If there are multiple + Transforms with different Transform Types, the proposal is an AND of + the different groups. For example, to propose ESP with (3DES or + IDEA) and (HMAC_MD5 or HMAC_SHA), the ESP proposal would contain two + Transform Type 1 candidates (one for 3DES and one for IDEA) and two + Transform Type 2 candidates (one for HMAC_MD5 and one for HMAC_SHA). + This effectively proposes four combinations of algorithms. If the + initiator wanted to propose only a subset of those, for example (3DES + and HMAC_MD5) or (IDEA and HMAC_SHA), there is no way to encode that + as multiple transforms within a single Proposal. Instead, the + initiator would have to construct two different Proposals, each with + two transforms. + + A given transform MAY have one or more Attributes. Attributes are + necessary when the transform can be used in more than one way, as + when an encryption algorithm has a variable key size. The transform + would specify the algorithm and the attribute would specify the key + size. Most transforms do not have attributes. A transform MUST NOT + have multiple attributes of the same type. To propose alternate + values for an attribute (for example, multiple key sizes for the AES + encryption algorithm), and implementation MUST include multiple + Transforms with the same Transform Type each with a single Attribute. + + Note that the semantics of Transforms and Attributes are quite + different from those in IKEv1. In IKEv1, a single Transform carried + multiple algorithms for a protocol with one carried in the Transform + and the others carried in the Attributes. + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ <Proposals> ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 6: Security Association Payload + + + +Kaufman Standards Track [Page 47] + +RFC 4306 IKEv2 December 2005 + + + o Proposals (variable) - One or more proposal substructures. + + The payload type for the Security Association Payload is thirty + three (33). + +3.3.1. Proposal Substructure + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! 0 (last) or 2 ! RESERVED ! Proposal Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Proposal # ! Protocol ID ! SPI Size !# of Transforms! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ~ SPI (variable) ~ + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ <Transforms> ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 7: Proposal Substructure + + o 0 (last) or 2 (more) (1 octet) - Specifies whether this is the + last Proposal Substructure in the SA. This syntax is inherited + from ISAKMP, but is unnecessary because the last Proposal could + be identified from the length of the SA. The value (2) + corresponds to a Payload Type of Proposal in IKEv1, and the + first 4 octets of the Proposal structure are designed to look + somewhat like the header of a Payload. + + o RESERVED (1 octet) - MUST be sent as zero; MUST be ignored on + receipt. + + o Proposal Length (2 octets) - Length of this proposal, including + all transforms and attributes that follow. + + o Proposal # (1 octet) - When a proposal is made, the first + proposal in an SA payload MUST be #1, and subsequent proposals + MUST either be the same as the previous proposal (indicating an + AND of the two proposals) or one more than the previous + proposal (indicating an OR of the two proposals). When a + proposal is accepted, all of the proposal numbers in the SA + payload MUST be the same and MUST match the number on the + proposal sent that was accepted. + + + + + + +Kaufman Standards Track [Page 48] + +RFC 4306 IKEv2 December 2005 + + + o Protocol ID (1 octet) - Specifies the IPsec protocol identifier + for the current negotiation. The defined values are: + + Protocol Protocol ID + RESERVED 0 + IKE 1 + AH 2 + ESP 3 + RESERVED TO IANA 4-200 + PRIVATE USE 201-255 + + o SPI Size (1 octet) - For an initial IKE_SA negotiation, this + field MUST be zero; the SPI is obtained from the outer header. + During subsequent negotiations, it is equal to the size, in + octets, of the SPI of the corresponding protocol (8 for IKE, 4 + for ESP and AH). + + o # of Transforms (1 octet) - Specifies the number of transforms + in this proposal. + + o SPI (variable) - The sending entity's SPI. Even if the SPI Size + is not a multiple of 4 octets, there is no padding applied to + the payload. When the SPI Size field is zero, this field is + not present in the Security Association payload. + + o Transforms (variable) - One or more transform substructures. + +3.3.2. Transform Substructure + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! 0 (last) or 3 ! RESERVED ! Transform Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + !Transform Type ! RESERVED ! Transform ID ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Transform Attributes ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 8: Transform Substructure + + o 0 (last) or 3 (more) (1 octet) - Specifies whether this is the + last Transform Substructure in the Proposal. This syntax is + inherited from ISAKMP, but is unnecessary because the last + Proposal could be identified from the length of the SA. The + + + + +Kaufman Standards Track [Page 49] + +RFC 4306 IKEv2 December 2005 + + + value (3) corresponds to a Payload Type of Transform in IKEv1, + and the first 4 octets of the Transform structure are designed + to look somewhat like the header of a Payload. + + o RESERVED - MUST be sent as zero; MUST be ignored on receipt. + + o Transform Length - The length (in octets) of the Transform + Substructure including Header and Attributes. + + o Transform Type (1 octet) - The type of transform being + specified in this transform. Different protocols support + different transform types. For some protocols, some of the + transforms may be optional. If a transform is optional and the + initiator wishes to propose that the transform be omitted, no + transform of the given type is included in the proposal. If + the initiator wishes to make use of the transform optional to + the responder, it includes a transform substructure with + transform ID = 0 as one of the options. + + o Transform ID (2 octets) - The specific instance of the + transform type being proposed. + + Transform Type Values + + Transform Used In + Type + RESERVED 0 + Encryption Algorithm (ENCR) 1 (IKE and ESP) + Pseudo-random Function (PRF) 2 (IKE) + Integrity Algorithm (INTEG) 3 (IKE, AH, optional in ESP) + Diffie-Hellman Group (D-H) 4 (IKE, optional in AH & ESP) + Extended Sequence Numbers (ESN) 5 (AH and ESP) + RESERVED TO IANA 6-240 + PRIVATE USE 241-255 + + For Transform Type 1 (Encryption Algorithm), defined Transform IDs + are: + + Name Number Defined In + RESERVED 0 + ENCR_DES_IV64 1 (RFC1827) + ENCR_DES 2 (RFC2405), [DES] + ENCR_3DES 3 (RFC2451) + ENCR_RC5 4 (RFC2451) + ENCR_IDEA 5 (RFC2451), [IDEA] + ENCR_CAST 6 (RFC2451) + ENCR_BLOWFISH 7 (RFC2451) + ENCR_3IDEA 8 (RFC2451) + + + +Kaufman Standards Track [Page 50] + +RFC 4306 IKEv2 December 2005 + + + ENCR_DES_IV32 9 + RESERVED 10 + ENCR_NULL 11 (RFC2410) + ENCR_AES_CBC 12 (RFC3602) + ENCR_AES_CTR 13 (RFC3664) + + values 14-1023 are reserved to IANA. Values 1024-65535 are + for private use among mutually consenting parties. + + For Transform Type 2 (Pseudo-random Function), defined Transform IDs + are: + + Name Number Defined In + RESERVED 0 + PRF_HMAC_MD5 1 (RFC2104), [MD5] + PRF_HMAC_SHA1 2 (RFC2104), [SHA] + PRF_HMAC_TIGER 3 (RFC2104) + PRF_AES128_XCBC 4 (RFC3664) + + values 5-1023 are reserved to IANA. Values 1024-65535 are for + private use among mutually consenting parties. + + For Transform Type 3 (Integrity Algorithm), defined Transform IDs + are: + + Name Number Defined In + NONE 0 + AUTH_HMAC_MD5_96 1 (RFC2403) + AUTH_HMAC_SHA1_96 2 (RFC2404) + AUTH_DES_MAC 3 + AUTH_KPDK_MD5 4 (RFC1826) + AUTH_AES_XCBC_96 5 (RFC3566) + + values 6-1023 are reserved to IANA. Values 1024-65535 are for + private use among mutually consenting parties. + + For Transform Type 4 (Diffie-Hellman Group), defined Transform IDs + are: + + Name Number + NONE 0 + Defined in Appendix B 1 - 2 + RESERVED 3 - 4 + Defined in [ADDGROUP] 5 + RESERVED TO IANA 6 - 13 + Defined in [ADDGROUP] 14 - 18 + RESERVED TO IANA 19 - 1023 + PRIVATE USE 1024-65535 + + + +Kaufman Standards Track [Page 51] + +RFC 4306 IKEv2 December 2005 + + + For Transform Type 5 (Extended Sequence Numbers), defined Transform + IDs are: + + Name Number + No Extended Sequence Numbers 0 + Extended Sequence Numbers 1 + RESERVED 2 - 65535 + +3.3.3. Valid Transform Types by Protocol + + The number and type of transforms that accompany an SA payload are + dependent on the protocol in the SA itself. An SA payload proposing + the establishment of an SA has the following mandatory and optional + transform types. A compliant implementation MUST understand all + mandatory and optional types for each protocol it supports (though it + need not accept proposals with unacceptable suites). A proposal MAY + omit the optional types if the only value for them it will accept is + NONE. + + Protocol Mandatory Types Optional Types + IKE ENCR, PRF, INTEG, D-H + ESP ENCR, ESN INTEG, D-H + AH INTEG, ESN D-H + +3.3.4. Mandatory Transform IDs + + The specification of suites that MUST and SHOULD be supported for + interoperability has been removed from this document because they are + likely to change more rapidly than this document evolves. + + An important lesson learned from IKEv1 is that no system should only + implement the mandatory algorithms and expect them to be the best + choice for all customers. For example, at the time that this + document was written, many IKEv1 implementers were starting to + migrate to AES in Cipher Block Chaining (CBC) mode for Virtual + Private Network (VPN) applications. Many IPsec systems based on + IKEv2 will implement AES, additional Diffie-Hellman groups, and + additional hash algorithms, and some IPsec customers already require + these algorithms in addition to the ones listed above. + + It is likely that IANA will add additional transforms in the future, + and some users may want to use private suites, especially for IKE + where implementations should be capable of supporting different + parameters, up to certain size limits. In support of this goal, all + implementations of IKEv2 SHOULD include a management facility that + allows specification (by a user or system administrator) of Diffie- + Hellman (DH) parameters (the generator, modulus, and exponent lengths + and values) for new DH groups. Implementations SHOULD provide a + + + +Kaufman Standards Track [Page 52] + +RFC 4306 IKEv2 December 2005 + + + management interface via which these parameters and the associated + transform IDs may be entered (by a user or system administrator), to + enable negotiating such groups. + + All implementations of IKEv2 MUST include a management facility that + enables a user or system administrator to specify the suites that are + acceptable for use with IKE. Upon receipt of a payload with a set of + transform IDs, the implementation MUST compare the transmitted + transform IDs against those locally configured via the management + controls, to verify that the proposed suite is acceptable based on + local policy. The implementation MUST reject SA proposals that are + not authorized by these IKE suite controls. Note that cryptographic + suites that MUST be implemented need not be configured as acceptable + to local policy. + +3.3.5. Transform Attributes + + Each transform in a Security Association payload may include + attributes that modify or complete the specification of the + transform. These attributes are type/value pairs and are defined + below. For example, if an encryption algorithm has a variable-length + key, the key length to be used may be specified as an attribute. + Attributes can have a value with a fixed two octet length or a + variable-length value. For the latter, the attribute is encoded as + type/length/value. + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + !A! Attribute Type ! AF=0 Attribute Length ! + !F! ! AF=1 Attribute Value ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! AF=0 Attribute Value ! + ! AF=1 Not Transmitted ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 9: Data Attributes + + o Attribute Type (2 octets) - Unique identifier for each type of + attribute (see below). + + The most significant bit of this field is the Attribute Format + bit (AF). It indicates whether the data attributes follow the + Type/Length/Value (TLV) format or a shortened Type/Value (TV) + format. If the AF bit is zero (0), then the Data Attributes + are of the Type/Length/Value (TLV) form. If the AF bit is a + one (1), then the Data Attributes are of the Type/Value form. + + + + +Kaufman Standards Track [Page 53] + +RFC 4306 IKEv2 December 2005 + + + o Attribute Length (2 octets) - Length in octets of the Attribute + Value. When the AF bit is a one (1), the Attribute Value is + only 2 octets and the Attribute Length field is not present. + + o Attribute Value (variable length) - Value of the Attribute + associated with the Attribute Type. If the AF bit is a zero + (0), this field has a variable length defined by the Attribute + Length field. If the AF bit is a one (1), the Attribute Value + has a length of 2 octets. + + Note that only a single attribute type (Key Length) is defined, and + it is fixed length. The variable-length encoding specification is + included only for future extensions. The only algorithms defined in + this document that accept attributes are the AES-based encryption, + integrity, and pseudo-random functions, which require a single + attribute specifying key width. + + Attributes described as basic MUST NOT be encoded using the + variable-length encoding. Variable-length attributes MUST NOT be + encoded as basic even if their value can fit into two octets. NOTE: + This is a change from IKEv1, where increased flexibility may have + simplified the composer of messages but certainly complicated the + parser. + + Attribute Type Value Attribute Format + -------------------------------------------------------------- + RESERVED 0-13 Key Length (in bits) + 14 TV RESERVED 15-17 + RESERVED TO IANA 18-16383 PRIVATE USE + 16384-32767 + + Values 0-13 and 15-17 were used in a similar context in IKEv1 and + should not be assigned except to matching values. Values 18-16383 + are reserved to IANA. Values 16384-32767 are for private use among + mutually consenting parties. + + - Key Length + + When using an Encryption Algorithm that has a variable-length key, + this attribute specifies the key length in bits (MUST use network + byte order). This attribute MUST NOT be used when the specified + Encryption Algorithm uses a fixed-length key. + + + + + + + + + +Kaufman Standards Track [Page 54] + +RFC 4306 IKEv2 December 2005 + + +3.3.6. Attribute Negotiation + + During security association negotiation, initiators present offers to + responders. Responders MUST select a single complete set of + parameters from the offers (or reject all offers if none are + acceptable). If there are multiple proposals, the responder MUST + choose a single proposal number and return all of the Proposal + substructures with that Proposal number. If there are multiple + Transforms with the same type, the responder MUST choose a single + one. Any attributes of a selected transform MUST be returned + unmodified. The initiator of an exchange MUST check that the + accepted offer is consistent with one of its proposals, and if not + that response MUST be rejected. + + Negotiating Diffie-Hellman groups presents some special challenges. + SA offers include proposed attributes and a Diffie-Hellman public + number (KE) in the same message. If in the initial exchange the + initiator offers to use one of several Diffie-Hellman groups, it + SHOULD pick the one the responder is most likely to accept and + include a KE corresponding to that group. If the guess turns out to + be wrong, the responder will indicate the correct group in the + response and the initiator SHOULD pick an element of that group for + its KE value when retrying the first message. It SHOULD, however, + continue to propose its full supported set of groups in order to + prevent a man-in-the-middle downgrade attack. + + Implementation Note: + + Certain negotiable attributes can have ranges or could have + multiple acceptable values. These include the key length of a + variable key length symmetric cipher. To further interoperability + and to support upgrading endpoints independently, implementers of + this protocol SHOULD accept values that they deem to supply + greater security. For instance, if a peer is configured to accept + a variable-length cipher with a key length of X bits and is + offered that cipher with a larger key length, the implementation + SHOULD accept the offer if it supports use of the longer key. + + Support of this capability allows an implementation to express a + concept of "at least" a certain level of security -- "a key length of + _at least_ X bits for cipher Y". + + + + + + + + + + +Kaufman Standards Track [Page 55] + +RFC 4306 IKEv2 December 2005 + + +3.4. Key Exchange Payload + + The Key Exchange Payload, denoted KE in this memo, is used to + exchange Diffie-Hellman public numbers as part of a Diffie-Hellman + key exchange. The Key Exchange Payload consists of the IKE generic + payload header followed by the Diffie-Hellman public value itself. + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! DH Group # ! RESERVED ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Key Exchange Data ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 10: Key Exchange Payload Format + + A key exchange payload is constructed by copying one's Diffie-Hellman + public value into the "Key Exchange Data" portion of the payload. + The length of the Diffie-Hellman public value MUST be equal to the + length of the prime modulus over which the exponentiation was + performed, prepending zero bits to the value if necessary. + + The DH Group # identifies the Diffie-Hellman group in which the Key + Exchange Data was computed (see section 3.3.2). If the selected + proposal uses a different Diffie-Hellman group, the message MUST be + rejected with a Notify payload of type INVALID_KE_PAYLOAD. + + The payload type for the Key Exchange payload is thirty four (34). + +3.5. Identification Payloads + + The Identification Payloads, denoted IDi and IDr in this memo, allow + peers to assert an identity to one another. This identity may be + used for policy lookup, but does not necessarily have to match + anything in the CERT payload; both fields may be used by an + implementation to perform access control decisions. + + NOTE: In IKEv1, two ID payloads were used in each direction to hold + Traffic Selector (TS) information for data passing over the SA. In + IKEv2, this information is carried in TS payloads (see section 3.13). + + + + + + +Kaufman Standards Track [Page 56] + +RFC 4306 IKEv2 December 2005 + + + The Identification Payload consists of the IKE generic payload header + followed by identification fields as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ID Type ! RESERVED | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Identification Data ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 11: Identification Payload Format + + o ID Type (1 octet) - Specifies the type of Identification being + used. + + o RESERVED - MUST be sent as zero; MUST be ignored on receipt. + + o Identification Data (variable length) - Value, as indicated by the + Identification Type. The length of the Identification Data is + computed from the size in the ID payload header. + + The payload types for the Identification Payload are thirty five (35) + for IDi and thirty six (36) for IDr. + + The following table lists the assigned values for the Identification + Type field, followed by a description of the Identification Data + which follows: + + ID Type Value + ------- ----- + RESERVED 0 + + ID_IPV4_ADDR 1 + + A single four (4) octet IPv4 address. + + ID_FQDN 2 + + A fully-qualified domain name string. An example of a + ID_FQDN is, "example.com". The string MUST not contain any + terminators (e.g., NULL, CR, etc.). + + + + + +Kaufman Standards Track [Page 57] + +RFC 4306 IKEv2 December 2005 + + + ID_RFC822_ADDR 3 + + A fully-qualified RFC822 email address string, An example of + a ID_RFC822_ADDR is, "jsmith@example.com". The string MUST + not contain any terminators. + + Reserved to IANA 4 + + ID_IPV6_ADDR 5 + + A single sixteen (16) octet IPv6 address. + + Reserved to IANA 6 - 8 + + ID_DER_ASN1_DN 9 + + The binary Distinguished Encoding Rules (DER) encoding of an + ASN.1 X.500 Distinguished Name [X.501]. + + ID_DER_ASN1_GN 10 + + The binary DER encoding of an ASN.1 X.500 GeneralName + [X.509]. + + ID_KEY_ID 11 + + An opaque octet stream which may be used to pass vendor- + specific information necessary to do certain proprietary + types of identification. + + Reserved to IANA 12-200 + + Reserved for private use 201-255 + + Two implementations will interoperate only if each can generate a + type of ID acceptable to the other. To assure maximum + interoperability, implementations MUST be configurable to send at + least one of ID_IPV4_ADDR, ID_FQDN, ID_RFC822_ADDR, or ID_KEY_ID, and + MUST be configurable to accept all of these types. Implementations + SHOULD be capable of generating and accepting all of these types. + IPv6-capable implementations MUST additionally be configurable to + accept ID_IPV6_ADDR. IPv6-only implementations MAY be configurable + to send only ID_IPV6_ADDR. + + + + + + + + +Kaufman Standards Track [Page 58] + +RFC 4306 IKEv2 December 2005 + + +3.6. Certificate Payload + + The Certificate Payload, denoted CERT in this memo, provides a means + to transport certificates or other authentication-related information + via IKE. Certificate payloads SHOULD be included in an exchange if + certificates are available to the sender unless the peer has + indicated an ability to retrieve this information from elsewhere + using an HTTP_CERT_LOOKUP_SUPPORTED Notify payload. Note that the + term "Certificate Payload" is somewhat misleading, because not all + authentication mechanisms use certificates and data other than + certificates may be passed in this payload. + + The Certificate Payload is defined as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Cert Encoding ! ! + +-+-+-+-+-+-+-+-+ ! + ~ Certificate Data ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 12: Certificate Payload Format + + o Certificate Encoding (1 octet) - This field indicates the type + of certificate or certificate-related information contained in + the Certificate Data field. + + Certificate Encoding Value + -------------------- ----- + RESERVED 0 + PKCS #7 wrapped X.509 certificate 1 + PGP Certificate 2 + DNS Signed Key 3 + X.509 Certificate - Signature 4 + Kerberos Token 6 + Certificate Revocation List (CRL) 7 + Authority Revocation List (ARL) 8 + SPKI Certificate 9 + X.509 Certificate - Attribute 10 + Raw RSA Key 11 + Hash and URL of X.509 certificate 12 + Hash and URL of X.509 bundle 13 + RESERVED to IANA 14 - 200 + PRIVATE USE 201 - 255 + + + +Kaufman Standards Track [Page 59] + +RFC 4306 IKEv2 December 2005 + + + o Certificate Data (variable length) - Actual encoding of + certificate data. The type of certificate is indicated by the + Certificate Encoding field. + + The payload type for the Certificate Payload is thirty seven (37). + + Specific syntax is for some of the certificate type codes above is + not defined in this document. The types whose syntax is defined in + this document are: + + X.509 Certificate - Signature (4) contains a DER encoded X.509 + certificate whose public key is used to validate the sender's AUTH + payload. + + Certificate Revocation List (7) contains a DER encoded X.509 + certificate revocation list. + + Raw RSA Key (11) contains a PKCS #1 encoded RSA key (see [RSA] and + [PKCS1]). + + Hash and URL encodings (12-13) allow IKE messages to remain short + by replacing long data structures with a 20 octet SHA-1 hash (see + [SHA]) of the replaced value followed by a variable-length URL + that resolves to the DER encoded data structure itself. This + improves efficiency when the endpoints have certificate data + cached and makes IKE less subject to denial of service attacks + that become easier to mount when IKE messages are large enough to + require IP fragmentation [KPS03]. + + Use the following ASN.1 definition for an X.509 bundle: + + CertBundle + { iso(1) identified-organization(3) dod(6) internet(1) + security(5) mechanisms(5) pkix(7) id-mod(0) + id-mod-cert-bundle(34) } + + DEFINITIONS EXPLICIT TAGS ::= + BEGIN + + IMPORTS + Certificate, CertificateList + FROM PKIX1Explicit88 + { iso(1) identified-organization(3) dod(6) + internet(1) security(5) mechanisms(5) pkix(7) + id-mod(0) id-pkix1-explicit(18) } ; + + + + + + +Kaufman Standards Track [Page 60] + +RFC 4306 IKEv2 December 2005 + + + CertificateOrCRL ::= CHOICE { + cert [0] Certificate, + crl [1] CertificateList } + + CertificateBundle ::= SEQUENCE OF CertificateOrCRL + + END + + Implementations MUST be capable of being configured to send and + accept up to four X.509 certificates in support of authentication, + and also MUST be capable of being configured to send and accept the + first two Hash and URL formats (with HTTP URLs). Implementations + SHOULD be capable of being configured to send and accept Raw RSA + keys. If multiple certificates are sent, the first certificate MUST + contain the public key used to sign the AUTH payload. The other + certificates may be sent in any order. + +3.7. Certificate Request Payload + + The Certificate Request Payload, denoted CERTREQ in this memo, + provides a means to request preferred certificates via IKE and can + appear in the IKE_INIT_SA response and/or the IKE_AUTH request. + Certificate Request payloads MAY be included in an exchange when the + sender needs to get the certificate of the receiver. If multiple CAs + are trusted and the cert encoding does not allow a list, then + multiple Certificate Request payloads SHOULD be transmitted. + + The Certificate Request Payload is defined as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Cert Encoding ! ! + +-+-+-+-+-+-+-+-+ ! + ~ Certification Authority ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 13: Certificate Request Payload Format + + o Certificate Encoding (1 octet) - Contains an encoding of the type + or format of certificate requested. Values are listed in section + 3.6. + + + + + + +Kaufman Standards Track [Page 61] + +RFC 4306 IKEv2 December 2005 + + + o Certification Authority (variable length) - Contains an encoding + of an acceptable certification authority for the type of + certificate requested. + + The payload type for the Certificate Request Payload is thirty eight + (38). + + The Certificate Encoding field has the same values as those defined + in section 3.6. The Certification Authority field contains an + indicator of trusted authorities for this certificate type. The + Certification Authority value is a concatenated list of SHA-1 hashes + of the public keys of trusted Certification Authorities (CAs). Each + is encoded as the SHA-1 hash of the Subject Public Key Info element + (see section 4.1.2.7 of [RFC3280]) from each Trust Anchor + certificate. The twenty-octet hashes are concatenated and included + with no other formatting. + + Note that the term "Certificate Request" is somewhat misleading, in + that values other than certificates are defined in a "Certificate" + payload and requests for those values can be present in a Certificate + Request Payload. The syntax of the Certificate Request payload in + such cases is not defined in this document. + + The Certificate Request Payload is processed by inspecting the "Cert + Encoding" field to determine whether the processor has any + certificates of this type. If so, the "Certification Authority" + field is inspected to determine if the processor has any certificates + that can be validated up to one of the specified certification + authorities. This can be a chain of certificates. + + If an end-entity certificate exists that satisfies the criteria + specified in the CERTREQ, a certificate or certificate chain SHOULD + be sent back to the certificate requestor if the recipient of the + CERTREQ: + + - is configured to use certificate authentication, + + - is allowed to send a CERT payload, + + - has matching CA trust policy governing the current negotiation, and + + - has at least one time-wise and usage appropriate end-entity + certificate chaining to a CA provided in the CERTREQ. + + Certificate revocation checking must be considered during the + chaining process used to select a certificate. Note that even if two + peers are configured to use two different CAs, cross-certification + relationships should be supported by appropriate selection logic. + + + +Kaufman Standards Track [Page 62] + +RFC 4306 IKEv2 December 2005 + + + The intent is not to prevent communication through the strict + adherence of selection of a certificate based on CERTREQ, when an + alternate certificate could be selected by the sender that would + still enable the recipient to successfully validate and trust it + through trust conveyed by cross-certification, CRLs, or other out- + of-band configured means. Thus, the processing of a CERTREQ should + be seen as a suggestion for a certificate to select, not a mandated + one. If no certificates exist, then the CERTREQ is ignored. This is + not an error condition of the protocol. There may be cases where + there is a preferred CA sent in the CERTREQ, but an alternate might + be acceptable (perhaps after prompting a human operator). + +3.8. Authentication Payload + + The Authentication Payload, denoted AUTH in this memo, contains data + used for authentication purposes. The syntax of the Authentication + data varies according to the Auth Method as specified below. + + The Authentication Payload is defined as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Auth Method ! RESERVED ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Authentication Data ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 14: Authentication Payload Format + + o Auth Method (1 octet) - Specifies the method of authentication + used. Values defined are: + + RSA Digital Signature (1) - Computed as specified in section + 2.15 using an RSA private key over a PKCS#1 padded hash (see + [RSA] and [PKCS1]). + + Shared Key Message Integrity Code (2) - Computed as specified in + section 2.15 using the shared key associated with the identity + in the ID payload and the negotiated prf function + + DSS Digital Signature (3) - Computed as specified in section + 2.15 using a DSS private key (see [DSS]) over a SHA-1 hash. + + + + +Kaufman Standards Track [Page 63] + +RFC 4306 IKEv2 December 2005 + + + The values 0 and 4-200 are reserved to IANA. The values 201-255 + are available for private use. + + o Authentication Data (variable length) - see section 2.15. + + The payload type for the Authentication Payload is thirty nine (39). + +3.9. Nonce Payload + + The Nonce Payload, denoted Ni and Nr in this memo for the initiator's + and responder's nonce respectively, contains random data used to + guarantee liveness during an exchange and protect against replay + attacks. + + The Nonce Payload is defined as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Nonce Data ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 15: Nonce Payload Format + + o Nonce Data (variable length) - Contains the random data generated + by the transmitting entity. + + The payload type for the Nonce Payload is forty (40). + + The size of a Nonce MUST be between 16 and 256 octets inclusive. + Nonce values MUST NOT be reused. + +3.10. Notify Payload + + The Notify Payload, denoted N in this document, is used to transmit + informational data, such as error conditions and state transitions, + to an IKE peer. A Notify Payload may appear in a response message + (usually specifying why a request was rejected), in an INFORMATIONAL + Exchange (to report an error not in an IKE request), or in any other + message to indicate sender capabilities or to modify the meaning of + the request. + + + + + + +Kaufman Standards Track [Page 64] + +RFC 4306 IKEv2 December 2005 + + + The Notify Payload is defined as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Protocol ID ! SPI Size ! Notify Message Type ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Security Parameter Index (SPI) ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Notification Data ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 16: Notify Payload Format + + o Protocol ID (1 octet) - If this notification concerns an existing + SA, this field indicates the type of that SA. For IKE_SA + notifications, this field MUST be one (1). For notifications + concerning IPsec SAs this field MUST contain either (2) to + indicate AH or (3) to indicate ESP. For notifications that do not + relate to an existing SA, this field MUST be sent as zero and MUST + be ignored on receipt. All other values for this field are + reserved to IANA for future assignment. + + o SPI Size (1 octet) - Length in octets of the SPI as defined by the + IPsec protocol ID or zero if no SPI is applicable. For a + notification concerning the IKE_SA, the SPI Size MUST be zero. + + o Notify Message Type (2 octets) - Specifies the type of + notification message. + + o SPI (variable length) - Security Parameter Index. + + o Notification Data (variable length) - Informational or error data + transmitted in addition to the Notify Message Type. Values for + this field are type specific (see below). + + The payload type for the Notify Payload is forty one (41). + + + + + + + + +Kaufman Standards Track [Page 65] + +RFC 4306 IKEv2 December 2005 + + +3.10.1. Notify Message Types + + Notification information can be error messages specifying why an SA + could not be established. It can also be status data that a process + managing an SA database wishes to communicate with a peer process. + The table below lists the Notification messages and their + corresponding values. The number of different error statuses was + greatly reduced from IKEv1 both for simplification and to avoid + giving configuration information to probers. + + Types in the range 0 - 16383 are intended for reporting errors. An + implementation receiving a Notify payload with one of these types + that it does not recognize in a response MUST assume that the + corresponding request has failed entirely. Unrecognized error types + in a request and status types in a request or response MUST be + ignored except that they SHOULD be logged. + + Notify payloads with status types MAY be added to any message and + MUST be ignored if not recognized. They are intended to indicate + capabilities, and as part of SA negotiation are used to negotiate + non-cryptographic parameters. + + NOTIFY MESSAGES - ERROR TYPES Value + ----------------------------- ----- + RESERVED 0 + + UNSUPPORTED_CRITICAL_PAYLOAD 1 + + Sent if the payload has the "critical" bit set and the + payload type is not recognized. Notification Data contains + the one-octet payload type. + + INVALID_IKE_SPI 4 + + Indicates an IKE message was received with an unrecognized + destination SPI. This usually indicates that the recipient + has rebooted and forgotten the existence of an IKE_SA. + + INVALID_MAJOR_VERSION 5 + + Indicates the recipient cannot handle the version of IKE + specified in the header. The closest version number that + the recipient can support will be in the reply header. + + INVALID_SYNTAX 7 + + Indicates the IKE message that was received was invalid + because some type, length, or value was out of range or + + + +Kaufman Standards Track [Page 66] + +RFC 4306 IKEv2 December 2005 + + + because the request was rejected for policy reasons. To + avoid a denial of service attack using forged messages, this + status may only be returned for and in an encrypted packet + if the message ID and cryptographic checksum were valid. To + avoid leaking information to someone probing a node, this + status MUST be sent in response to any error not covered by + one of the other status types. To aid debugging, more + detailed error information SHOULD be written to a console or + log. + + INVALID_MESSAGE_ID 9 + + Sent when an IKE message ID outside the supported window is + received. This Notify MUST NOT be sent in a response; the + invalid request MUST NOT be acknowledged. Instead, inform + the other side by initiating an INFORMATIONAL exchange with + Notification data containing the four octet invalid message + ID. Sending this notification is optional, and + notifications of this type MUST be rate limited. + + INVALID_SPI 11 + + MAY be sent in an IKE INFORMATIONAL exchange when a node + receives an ESP or AH packet with an invalid SPI. The + Notification Data contains the SPI of the invalid packet. + This usually indicates a node has rebooted and forgotten an + SA. If this Informational Message is sent outside the + context of an IKE_SA, it should be used by the recipient + only as a "hint" that something might be wrong (because it + could easily be forged). + + NO_PROPOSAL_CHOSEN 14 + + None of the proposed crypto suites was acceptable. + + INVALID_KE_PAYLOAD 17 + + The D-H Group # field in the KE payload is not the group # + selected by the responder for this exchange. There are two + octets of data associated with this notification: the + accepted D-H Group # in big endian order. + + AUTHENTICATION_FAILED 24 + + Sent in the response to an IKE_AUTH message when for some + reason the authentication failed. There is no associated + data. + + + + +Kaufman Standards Track [Page 67] + +RFC 4306 IKEv2 December 2005 + + + SINGLE_PAIR_REQUIRED 34 + + This error indicates that a CREATE_CHILD_SA request is + unacceptable because its sender is only willing to accept + traffic selectors specifying a single pair of addresses. The + requestor is expected to respond by requesting an SA for only + the specific traffic it is trying to forward. + + NO_ADDITIONAL_SAS 35 + + This error indicates that a CREATE_CHILD_SA request is + unacceptable because the responder is unwilling to accept any + more CHILD_SAs on this IKE_SA. Some minimal implementations may + only accept a single CHILD_SA setup in the context of an initial + IKE exchange and reject any subsequent attempts to add more. + + INTERNAL_ADDRESS_FAILURE 36 + + Indicates an error assigning an internal address (i.e., + INTERNAL_IP4_ADDRESS or INTERNAL_IP6_ADDRESS) during the + processing of a Configuration Payload by a responder. If this + error is generated within an IKE_AUTH exchange, no CHILD_SA will + be created. + + FAILED_CP_REQUIRED 37 + + Sent by responder in the case where CP(CFG_REQUEST) was expected + but not received, and so is a conflict with locally configured + policy. There is no associated data. + + TS_UNACCEPTABLE 38 + + Indicates that none of the addresses/protocols/ports in the + supplied traffic selectors is acceptable. + + INVALID_SELECTORS 39 + + MAY be sent in an IKE INFORMATIONAL exchange when a node + receives an ESP or AH packet whose selectors do not match + those of the SA on which it was delivered (and that caused + the packet to be dropped). The Notification Data contains + the start of the offending packet (as in ICMP messages) and + the SPI field of the notification is set to match the SPI of + the IPsec SA. + + RESERVED TO IANA - Error types 40 - 8191 + + Private Use - Errors 8192 - 16383 + + + +Kaufman Standards Track [Page 68] + +RFC 4306 IKEv2 December 2005 + + + NOTIFY MESSAGES - STATUS TYPES Value + ------------------------------ ----- + + INITIAL_CONTACT 16384 + + This notification asserts that this IKE_SA is the only + IKE_SA currently active between the authenticated + identities. It MAY be sent when an IKE_SA is established + after a crash, and the recipient MAY use this information to + delete any other IKE_SAs it has to the same authenticated + identity without waiting for a timeout. This notification + MUST NOT be sent by an entity that may be replicated (e.g., + a roaming user's credentials where the user is allowed to + connect to the corporate firewall from two remote systems at + the same time). + + SET_WINDOW_SIZE 16385 + + This notification asserts that the sending endpoint is + capable of keeping state for multiple outstanding exchanges, + permitting the recipient to send multiple requests before + getting a response to the first. The data associated with a + SET_WINDOW_SIZE notification MUST be 4 octets long and + contain the big endian representation of the number of + messages the sender promises to keep. Window size is always + one until the initial exchanges complete. + + ADDITIONAL_TS_POSSIBLE 16386 + + This notification asserts that the sending endpoint narrowed + the proposed traffic selectors but that other traffic + selectors would also have been acceptable, though only in a + separate SA (see section 2.9). There is no data associated + with this Notify type. It may be sent only as an additional + payload in a message including accepted TSs. + + IPCOMP_SUPPORTED 16387 + + This notification may be included only in a message + containing an SA payload negotiating a CHILD_SA and + indicates a willingness by its sender to use IPComp on this + SA. The data associated with this notification includes a + two-octet IPComp CPI followed by a one-octet transform ID + optionally followed by attributes whose length and format + are defined by that transform ID. A message proposing an SA + may contain multiple IPCOMP_SUPPORTED notifications to + indicate multiple supported algorithms. A message accepting + an SA may contain at most one. + + + +Kaufman Standards Track [Page 69] + +RFC 4306 IKEv2 December 2005 + + + The transform IDs currently defined are: + + NAME NUMBER DEFINED IN + ----------- ------ ----------- + RESERVED 0 + IPCOMP_OUI 1 + IPCOMP_DEFLATE 2 RFC 2394 + IPCOMP_LZS 3 RFC 2395 + IPCOMP_LZJH 4 RFC 3051 + + values 5-240 are reserved to IANA. Values 241-255 are + for private use among mutually consenting parties. + + NAT_DETECTION_SOURCE_IP 16388 + + This notification is used by its recipient to determine + whether the source is behind a NAT box. The data associated + with this notification is a SHA-1 digest of the SPIs (in the + order they appear in the header), IP address, and port on + which this packet was sent. There MAY be multiple Notify + payloads of this type in a message if the sender does not + know which of several network attachments will be used to + send the packet. The recipient of this notification MAY + compare the supplied value to a SHA-1 hash of the SPIs, + source IP address, and port, and if they don't match it + SHOULD enable NAT traversal (see section 2.23). + Alternately, it MAY reject the connection attempt if NAT + traversal is not supported. + + NAT_DETECTION_DESTINATION_IP 16389 + + This notification is used by its recipient to determine + whether it is behind a NAT box. The data associated with + this notification is a SHA-1 digest of the SPIs (in the + order they appear in the header), IP address, and port to + which this packet was sent. The recipient of this + notification MAY compare the supplied value to a hash of the + SPIs, destination IP address, and port, and if they don't + match it SHOULD invoke NAT traversal (see section 2.23). If + they don't match, it means that this end is behind a NAT and + this end SHOULD start sending keepalive packets as defined + in [Hutt05]. Alternately, it MAY reject the connection + attempt if NAT traversal is not supported. + + + + + + + + +Kaufman Standards Track [Page 70] + +RFC 4306 IKEv2 December 2005 + + + COOKIE 16390 + + This notification MAY be included in an IKE_SA_INIT + response. It indicates that the request should be retried + with a copy of this notification as the first payload. This + notification MUST be included in an IKE_SA_INIT request + retry if a COOKIE notification was included in the initial + response. The data associated with this notification MUST + be between 1 and 64 octets in length (inclusive). + + USE_TRANSPORT_MODE 16391 + + This notification MAY be included in a request message that + also includes an SA payload requesting a CHILD_SA. It + requests that the CHILD_SA use transport mode rather than + tunnel mode for the SA created. If the request is accepted, + the response MUST also include a notification of type + USE_TRANSPORT_MODE. If the responder declines the request, + the CHILD_SA will be established in tunnel mode. If this is + unacceptable to the initiator, the initiator MUST delete the + SA. Note: Except when using this option to negotiate + transport mode, all CHILD_SAs will use tunnel mode. + + Note: The ECN decapsulation modifications specified in + [RFC4301] MUST be performed for every tunnel mode SA created + by IKEv2. + + HTTP_CERT_LOOKUP_SUPPORTED 16392 + + This notification MAY be included in any message that can + include a CERTREQ payload and indicates that the sender is + capable of looking up certificates based on an HTTP-based + URL (and hence presumably would prefer to receive + certificate specifications in that format). + + REKEY_SA 16393 + + This notification MUST be included in a CREATE_CHILD_SA + exchange if the purpose of the exchange is to replace an + existing ESP or AH SA. The SPI field identifies the SA + being rekeyed. There is no data. + + ESP_TFC_PADDING_NOT_SUPPORTED 16394 + + This notification asserts that the sending endpoint will NOT + accept packets that contain Flow Confidentiality (TFC) + padding. + + + + +Kaufman Standards Track [Page 71] + +RFC 4306 IKEv2 December 2005 + + + NON_FIRST_FRAGMENTS_ALSO 16395 + + Used for fragmentation control. See [RFC4301] for + explanation. + + RESERVED TO IANA - STATUS TYPES 16396 - 40959 + + Private Use - STATUS TYPES 40960 - 65535 + +3.11. Delete Payload + + The Delete Payload, denoted D in this memo, contains a protocol- + specific security association identifier that the sender has removed + from its security association database and is, therefore, no longer + valid. Figure 17 shows the format of the Delete Payload. It is + possible to send multiple SPIs in a Delete payload; however, each SPI + MUST be for the same protocol. Mixing of protocol identifiers MUST + NOT be performed in a Delete payload. It is permitted, however, to + include multiple Delete payloads in a single INFORMATIONAL exchange + where each Delete payload lists SPIs for a different protocol. + + Deletion of the IKE_SA is indicated by a protocol ID of 1 (IKE) but + no SPIs. Deletion of a CHILD_SA, such as ESP or AH, will contain the + IPsec protocol ID of that protocol (2 for AH, 3 for ESP), and the SPI + is the SPI the sending endpoint would expect in inbound ESP or AH + packets. + + The Delete Payload is defined as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Protocol ID ! SPI Size ! # of SPIs ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Security Parameter Index(es) (SPI) ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 17: Delete Payload Format + + o Protocol ID (1 octet) - Must be 1 for an IKE_SA, 2 for AH, or 3 + for ESP. + + + + + + +Kaufman Standards Track [Page 72] + +RFC 4306 IKEv2 December 2005 + + + o SPI Size (1 octet) - Length in octets of the SPI as defined by the + protocol ID. It MUST be zero for IKE (SPI is in message header) + or four for AH and ESP. + + o # of SPIs (2 octets) - The number of SPIs contained in the Delete + payload. The size of each SPI is defined by the SPI Size field. + + o Security Parameter Index(es) (variable length) - Identifies the + specific security association(s) to delete. The length of this + field is determined by the SPI Size and # of SPIs fields. + + The payload type for the Delete Payload is forty two (42). + +3.12. Vendor ID Payload + + The Vendor ID Payload, denoted V in this memo, contains a vendor + defined constant. The constant is used by vendors to identify and + recognize remote instances of their implementations. This mechanism + allows a vendor to experiment with new features while maintaining + backward compatibility. + + A Vendor ID payload MAY announce that the sender is capable to + accepting certain extensions to the protocol, or it MAY simply + identify the implementation as an aid in debugging. A Vendor ID + payload MUST NOT change the interpretation of any information defined + in this specification (i.e., the critical bit MUST be set to 0). + Multiple Vendor ID payloads MAY be sent. An implementation is NOT + REQUIRED to send any Vendor ID payload at all. + + A Vendor ID payload may be sent as part of any message. Reception of + a familiar Vendor ID payload allows an implementation to make use of + Private USE numbers described throughout this memo -- private + payloads, private exchanges, private notifications, etc. Unfamiliar + Vendor IDs MUST be ignored. + + Writers of Internet-Drafts who wish to extend this protocol MUST + define a Vendor ID payload to announce the ability to implement the + extension in the Internet-Draft. It is expected that Internet-Drafts + that gain acceptance and are standardized will be given "magic + numbers" out of the Future Use range by IANA, and the requirement to + use a Vendor ID will go away. + + + + + + + + + + +Kaufman Standards Track [Page 73] + +RFC 4306 IKEv2 December 2005 + + + The Vendor ID Payload fields are defined as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Vendor ID (VID) ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 18: Vendor ID Payload Format + + o Vendor ID (variable length) - It is the responsibility of the + person choosing the Vendor ID to assure its uniqueness in spite of + the absence of any central registry for IDs. Good practice is to + include a company name, a person name, or some such. If you want + to show off, you might include the latitude and longitude and time + where you were when you chose the ID and some random input. A + message digest of a long unique string is preferable to the long + unique string itself. + + The payload type for the Vendor ID Payload is forty three (43). + +3.13. Traffic Selector Payload + + The Traffic Selector Payload, denoted TS in this memo, allows peers + to identify packet flows for processing by IPsec security services. + The Traffic Selector Payload consists of the IKE generic payload + header followed by individual traffic selectors as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Number of TSs ! RESERVED ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ <Traffic Selectors> ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 19: Traffic Selectors Payload Format + + o Number of TSs (1 octet) - Number of traffic selectors being + provided. + + + +Kaufman Standards Track [Page 74] + +RFC 4306 IKEv2 December 2005 + + + o RESERVED - This field MUST be sent as zero and MUST be ignored on + receipt. + + o Traffic Selectors (variable length) - One or more individual + traffic selectors. + + The length of the Traffic Selector payload includes the TS header and + all the traffic selectors. + + The payload type for the Traffic Selector payload is forty four (44) + for addresses at the initiator's end of the SA and forty five (45) + for addresses at the responder's end. + +3.13.1. Traffic Selector + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! TS Type !IP Protocol ID*| Selector Length | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Start Port* | End Port* | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Starting Address* ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Ending Address* ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 20: Traffic Selector + + * Note: All fields other than TS Type and Selector Length depend on + the TS Type. The fields shown are for TS Types 7 and 8, the only two + values currently defined. + + o TS Type (one octet) - Specifies the type of traffic selector. + + o IP protocol ID (1 octet) - Value specifying an associated IP + protocol ID (e.g., UDP/TCP/ICMP). A value of zero means that the + protocol ID is not relevant to this traffic selector -- the SA can + carry all protocols. + + o Selector Length - Specifies the length of this Traffic Selector + Substructure including the header. + + + + + +Kaufman Standards Track [Page 75] + +RFC 4306 IKEv2 December 2005 + + + o Start Port (2 octets) - Value specifying the smallest port number + allowed by this Traffic Selector. For protocols for which port is + undefined, or if all ports are allowed, this field MUST be zero. + For the ICMP protocol, the two one-octet fields Type and Code are + treated as a single 16-bit integer (with Type in the most + significant eight bits and Code in the least significant eight + bits) port number for the purposes of filtering based on this + field. + + o End Port (2 octets) - Value specifying the largest port number + allowed by this Traffic Selector. For protocols for which port is + undefined, or if all ports are allowed, this field MUST be 65535. + For the ICMP protocol, the two one-octet fields Type and Code are + treated as a single 16-bit integer (with Type in the most + significant eight bits and Code in the least significant eight + bits) port number for the purposed of filtering based on this + field. + + o Starting Address - The smallest address included in this Traffic + Selector (length determined by TS type). + + o Ending Address - The largest address included in this Traffic + Selector (length determined by TS type). + + Systems that are complying with [RFC4301] that wish to indicate "ANY" + ports MUST set the start port to 0 and the end port to 65535; note + that according to [RFC4301], "ANY" includes "OPAQUE". Systems + working with [RFC4301] that wish to indicate "OPAQUE" ports, but not + "ANY" ports, MUST set the start port to 65535 and the end port to 0. + + The following table lists the assigned values for the Traffic + Selector Type field and the corresponding Address Selector Data. + + TS Type Value + ------- ----- + RESERVED 0-6 + + TS_IPV4_ADDR_RANGE 7 + + A range of IPv4 addresses, represented by two four-octet + values. The first value is the beginning IPv4 address + (inclusive) and the second value is the ending IPv4 address + (inclusive). All addresses falling between the two + specified addresses are considered to be within the list. + + + + + + + +Kaufman Standards Track [Page 76] + +RFC 4306 IKEv2 December 2005 + + + TS_IPV6_ADDR_RANGE 8 + + A range of IPv6 addresses, represented by two sixteen-octet + values. The first value is the beginning IPv6 address + (inclusive) and the second value is the ending IPv6 address + (inclusive). All addresses falling between the two + specified addresses are considered to be within the list. + + RESERVED TO IANA 9-240 + PRIVATE USE 241-255 + +3.14. Encrypted Payload + + The Encrypted Payload, denoted SK{...} or E in this memo, contains + other payloads in encrypted form. The Encrypted Payload, if present + in a message, MUST be the last payload in the message. Often, it is + the only payload in the message. + + The algorithms for encryption and integrity protection are negotiated + during IKE_SA setup, and the keys are computed as specified in + sections 2.14 and 2.18. + + The encryption and integrity protection algorithms are modeled after + the ESP algorithms described in RFCs 2104 [KBC96], 4303 [RFC4303], + and 2451 [ESPCBC]. This document completely specifies the + cryptographic processing of IKE data, but those documents should be + consulted for design rationale. We require a block cipher with a + fixed block size and an integrity check algorithm that computes a + fixed-length checksum over a variable size message. + + The payload type for an Encrypted payload is forty six (46). The + Encrypted Payload consists of the IKE generic payload header followed + by individual fields as follows: + + + + + + + + + + + + + + + + + + +Kaufman Standards Track [Page 77] + +RFC 4306 IKEv2 December 2005 + + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Initialization Vector ! + ! (length is block size for encryption algorithm) ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ~ Encrypted IKE Payloads ~ + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! Padding (0-255 octets) ! + +-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+ + ! ! Pad Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ~ Integrity Checksum Data ~ + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 21: Encrypted Payload Format + + o Next Payload - The payload type of the first embedded payload. + Note that this is an exception in the standard header format, + since the Encrypted payload is the last payload in the message and + therefore the Next Payload field would normally be zero. But + because the content of this payload is embedded payloads and there + was no natural place to put the type of the first one, that type + is placed here. + + o Payload Length - Includes the lengths of the header, IV, Encrypted + IKE Payloads, Padding, Pad Length, and Integrity Checksum Data. + + o Initialization Vector - A randomly chosen value whose length is + equal to the block length of the underlying encryption algorithm. + Recipients MUST accept any value. Senders SHOULD either pick this + value pseudo-randomly and independently for each message or use + the final ciphertext block of the previous message sent. Senders + MUST NOT use the same value for each message, use a sequence of + values with low hamming distance (e.g., a sequence number), or use + ciphertext from a received message. + + o IKE Payloads are as specified earlier in this section. This field + is encrypted with the negotiated cipher. + + o Padding MAY contain any value chosen by the sender, and MUST have + a length that makes the combination of the Payloads, the Padding, + and the Pad Length to be a multiple of the encryption block size. + This field is encrypted with the negotiated cipher. + + + + + +Kaufman Standards Track [Page 78] + +RFC 4306 IKEv2 December 2005 + + + o Pad Length is the length of the Padding field. The sender SHOULD + set the Pad Length to the minimum value that makes the combination + of the Payloads, the Padding, and the Pad Length a multiple of the + block size, but the recipient MUST accept any length that results + in proper alignment. This field is encrypted with the negotiated + cipher. + + o Integrity Checksum Data is the cryptographic checksum of the + entire message starting with the Fixed IKE Header through the Pad + Length. The checksum MUST be computed over the encrypted message. + Its length is determined by the integrity algorithm negotiated. + +3.15. Configuration Payload + + The Configuration payload, denoted CP in this document, is used to + exchange configuration information between IKE peers. The exchange + is for an IRAC to request an internal IP address from an IRAS and to + exchange other information of the sort that one would acquire with + Dynamic Host Configuration Protocol (DHCP) if the IRAC were directly + connected to a LAN. + + Configuration payloads are of type CFG_REQUEST/CFG_REPLY or + CFG_SET/CFG_ACK (see CFG Type in the payload description below). + CFG_REQUEST and CFG_SET payloads may optionally be added to any IKE + request. The IKE response MUST include either a corresponding + CFG_REPLY or CFG_ACK or a Notify payload with an error type + indicating why the request could not be honored. An exception is + that a minimal implementation MAY ignore all CFG_REQUEST and CFG_SET + payloads, so a response message without a corresponding CFG_REPLY or + CFG_ACK MUST be accepted as an indication that the request was not + supported. + + "CFG_REQUEST/CFG_REPLY" allows an IKE endpoint to request information + from its peer. If an attribute in the CFG_REQUEST Configuration + Payload is not zero-length, it is taken as a suggestion for that + attribute. The CFG_REPLY Configuration Payload MAY return that + value, or a new one. It MAY also add new attributes and not include + some requested ones. Requestors MUST ignore returned attributes that + they do not recognize. + + Some attributes MAY be multi-valued, in which case multiple attribute + values of the same type are sent and/or returned. Generally, all + values of an attribute are returned when the attribute is requested. + For some attributes (in this version of the specification only + internal addresses), multiple requests indicates a request that + multiple values be assigned. For these attributes, the number of + values returned SHOULD NOT exceed the number requested. + + + + +Kaufman Standards Track [Page 79] + +RFC 4306 IKEv2 December 2005 + + + If the data type requested in a CFG_REQUEST is not recognized or not + supported, the responder MUST NOT return an error type but rather + MUST either send a CFG_REPLY that MAY be empty or a reply not + containing a CFG_REPLY payload at all. Error returns are reserved + for cases where the request is recognized but cannot be performed as + requested or the request is badly formatted. + + "CFG_SET/CFG_ACK" allows an IKE endpoint to push configuration data + to its peer. In this case, the CFG_SET Configuration Payload + contains attributes the initiator wants its peer to alter. The + responder MUST return a Configuration Payload if it accepted any of + the configuration data and it MUST contain the attributes that the + responder accepted with zero-length data. Those attributes that it + did not accept MUST NOT be in the CFG_ACK Configuration Payload. If + no attributes were accepted, the responder MUST return either an + empty CFG_ACK payload or a response message without a CFG_ACK + payload. There are currently no defined uses for the CFG_SET/CFG_ACK + exchange, though they may be used in connection with extensions based + on Vendor IDs. An minimal implementation of this specification MAY + ignore CFG_SET payloads. + + Extensions via the CP payload SHOULD NOT be used for general purpose + management. Its main intent is to provide a bootstrap mechanism to + exchange information within IPsec from IRAS to IRAC. While it MAY be + useful to use such a method to exchange information between some + Security Gateways (SGW) or small networks, existing management + protocols such as DHCP [DHCP], RADIUS [RADIUS], SNMP, or LDAP [LDAP] + should be preferred for enterprise management as well as subsequent + information exchanges. + + The Configuration Payload is defined as follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! CFG Type ! RESERVED ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ Configuration Attributes ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 22: Configuration Payload Format + + The payload type for the Configuration Payload is forty seven (47). + + + + +Kaufman Standards Track [Page 80] + +RFC 4306 IKEv2 December 2005 + + + o CFG Type (1 octet) - The type of exchange represented by the + Configuration Attributes. + + CFG Type Value + =========== ===== + RESERVED 0 + CFG_REQUEST 1 + CFG_REPLY 2 + CFG_SET 3 + CFG_ACK 4 + + values 5-127 are reserved to IANA. Values 128-255 are for private + use among mutually consenting parties. + + o RESERVED (3 octets) - MUST be sent as zero; MUST be ignored on + receipt. + + o Configuration Attributes (variable length) - These are type length + values specific to the Configuration Payload and are defined + below. There may be zero or more Configuration Attributes in this + payload. + +3.15.1. Configuration Attributes + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + !R| Attribute Type ! Length | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + ~ Value ~ + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 23: Configuration Attribute Format + + o Reserved (1 bit) - This bit MUST be set to zero and MUST be + ignored on receipt. + + o Attribute Type (15 bits) - A unique identifier for each of the + Configuration Attribute Types. + + o Length (2 octets) - Length in octets of Value. + + o Value (0 or more octets) - The variable-length value of this + Configuration Attribute. + + + + + +Kaufman Standards Track [Page 81] + +RFC 4306 IKEv2 December 2005 + + + The following attribute types have been defined: + + Multi- + Attribute Type Value Valued Length + ======================= ===== ====== ================== + RESERVED 0 + INTERNAL_IP4_ADDRESS 1 YES* 0 or 4 octets + INTERNAL_IP4_NETMASK 2 NO 0 or 4 octets + INTERNAL_IP4_DNS 3 YES 0 or 4 octets + INTERNAL_IP4_NBNS 4 YES 0 or 4 octets + INTERNAL_ADDRESS_EXPIRY 5 NO 0 or 4 octets + INTERNAL_IP4_DHCP 6 YES 0 or 4 octets + APPLICATION_VERSION 7 NO 0 or more + INTERNAL_IP6_ADDRESS 8 YES* 0 or 17 octets + RESERVED 9 + INTERNAL_IP6_DNS 10 YES 0 or 16 octets + INTERNAL_IP6_NBNS 11 YES 0 or 16 octets + INTERNAL_IP6_DHCP 12 YES 0 or 16 octets + INTERNAL_IP4_SUBNET 13 YES 0 or 8 octets + SUPPORTED_ATTRIBUTES 14 NO Multiple of 2 + INTERNAL_IP6_SUBNET 15 YES 17 octets + + * These attributes may be multi-valued on return only if multiple + values were requested. + + Types 16-16383 are reserved to IANA. Values 16384-32767 are for + private use among mutually consenting parties. + + o INTERNAL_IP4_ADDRESS, INTERNAL_IP6_ADDRESS - An address on the + internal network, sometimes called a red node address or + private address and MAY be a private address on the Internet. + In a request message, the address specified is a requested + address (or zero if no specific address is requested). If a + specific address is requested, it likely indicates that a + previous connection existed with this address and the requestor + would like to reuse that address. With IPv6, a requestor MAY + supply the low-order address bytes it wants to use. Multiple + internal addresses MAY be requested by requesting multiple + internal address attributes. The responder MAY only send up to + the number of addresses requested. The INTERNAL_IP6_ADDRESS is + made up of two fields: the first is a sixteen-octet IPv6 + address and the second is a one-octet prefix-length as defined + in [ADDRIPV6]. + + The requested address is valid until the expiry time defined + with the INTERNAL_ADDRESS EXPIRY attribute or there are no + IKE_SAs between the peers. + + + + +Kaufman Standards Track [Page 82] + +RFC 4306 IKEv2 December 2005 + + + o INTERNAL_IP4_NETMASK - The internal network's netmask. Only + one netmask is allowed in the request and reply messages (e.g., + 255.255.255.0), and it MUST be used only with an + INTERNAL_IP4_ADDRESS attribute. + + o INTERNAL_IP4_DNS, INTERNAL_IP6_DNS - Specifies an address of a + DNS server within the network. Multiple DNS servers MAY be + requested. The responder MAY respond with zero or more DNS + server attributes. + + o INTERNAL_IP4_NBNS, INTERNAL_IP6_NBNS - Specifies an address of + a NetBios Name Server (WINS) within the network. Multiple NBNS + servers MAY be requested. The responder MAY respond with zero + or more NBNS server attributes. + + o INTERNAL_ADDRESS_EXPIRY - Specifies the number of seconds that + the host can use the internal IP address. The host MUST renew + the IP address before this expiry time. Only one of these + attributes MAY be present in the reply. + + o INTERNAL_IP4_DHCP, INTERNAL_IP6_DHCP - Instructs the host to + send any internal DHCP requests to the address contained within + the attribute. Multiple DHCP servers MAY be requested. The + responder MAY respond with zero or more DHCP server attributes. + + o APPLICATION_VERSION - The version or application information of + the IPsec host. This is a string of printable ASCII characters + that is NOT null terminated. + + o INTERNAL_IP4_SUBNET - The protected sub-networks that this + edge-device protects. This attribute is made up of two fields: + the first is an IP address and the second is a netmask. + Multiple sub-networks MAY be requested. The responder MAY + respond with zero or more sub-network attributes. + + o SUPPORTED_ATTRIBUTES - When used within a Request, this + attribute MUST be zero-length and specifies a query to the + responder to reply back with all of the attributes that it + supports. The response contains an attribute that contains a + set of attribute identifiers each in 2 octets. The length + divided by 2 (octets) would state the number of supported + attributes contained in the response. + + + + + + + + + +Kaufman Standards Track [Page 83] + +RFC 4306 IKEv2 December 2005 + + + o INTERNAL_IP6_SUBNET - The protected sub-networks that this + edge-device protects. This attribute is made up of two fields: + the first is a sixteen-octet IPv6 address and the second is a + one-octet prefix-length as defined in [ADDRIPV6]. Multiple + sub-networks MAY be requested. The responder MAY respond with + zero or more sub-network attributes. + + Note that no recommendations are made in this document as to how + an implementation actually figures out what information to send in + a reply. That is, we do not recommend any specific method of an + IRAS determining which DNS server should be returned to a + requesting IRAC. + +3.16. Extensible Authentication Protocol (EAP) Payload + + The Extensible Authentication Protocol Payload, denoted EAP in this + memo, allows IKE_SAs to be authenticated using the protocol defined + in RFC 3748 [EAP] and subsequent extensions to that protocol. The + full set of acceptable values for the payload is defined elsewhere, + but a short summary of RFC 3748 is included here to make this + document stand alone in the common cases. + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! ! + ~ EAP Message ~ + ! ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure 24: EAP Payload Format + + The payload type for an EAP Payload is forty eight (48). + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Code ! Identifier ! Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Type ! Type_Data... + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- + + Figure 25: EAP Message Format + + o Code (1 octet) indicates whether this message is a Request (1), + Response (2), Success (3), or Failure (4). + + + +Kaufman Standards Track [Page 84] + +RFC 4306 IKEv2 December 2005 + + + o Identifier (1 octet) is used in PPP to distinguish replayed + messages from repeated ones. Since in IKE, EAP runs over a + reliable protocol, it serves no function here. In a response + message, this octet MUST be set to match the identifier in the + corresponding request. In other messages, this field MAY be set + to any value. + + o Length (2 octets) is the length of the EAP message and MUST be + four less than the Payload Length of the encapsulating payload. + + o Type (1 octet) is present only if the Code field is Request (1) or + Response (2). For other codes, the EAP message length MUST be + four octets and the Type and Type_Data fields MUST NOT be present. + In a Request (1) message, Type indicates the data being requested. + In a Response (2) message, Type MUST either be Nak or match the + type of the data requested. The following types are defined in + RFC 3748: + + 1 Identity + 2 Notification + 3 Nak (Response Only) + 4 MD5-Challenge + 5 One-Time Password (OTP) + 6 Generic Token Card + + o Type_Data (Variable Length) varies with the Type of Request and + the associated Response. For the documentation of the EAP + methods, see [EAP]. + + Note that since IKE passes an indication of initiator identity in + message 3 of the protocol, the responder SHOULD NOT send EAP Identity + requests. The initiator SHOULD, however, respond to such requests if + it receives them. + +4. Conformance Requirements + + In order to assure that all implementations of IKEv2 can + interoperate, there are "MUST support" requirements in addition to + those listed elsewhere. Of course, IKEv2 is a security protocol, and + one of its major functions is to allow only authorized parties to + successfully complete establishment of SAs. So a particular + implementation may be configured with any of a number of restrictions + concerning algorithms and trusted authorities that will prevent + universal interoperability. + + + + + + + +Kaufman Standards Track [Page 85] + +RFC 4306 IKEv2 December 2005 + + + IKEv2 is designed to permit minimal implementations that can + interoperate with all compliant implementations. There are a series + of optional features that can easily be ignored by a particular + implementation if it does not support that feature. Those features + include: + + Ability to negotiate SAs through a NAT and tunnel the resulting + ESP SA over UDP. + + Ability to request (and respond to a request for) a temporary IP + address on the remote end of a tunnel. + + Ability to support various types of legacy authentication. + + Ability to support window sizes greater than one. + + Ability to establish multiple ESP and/or AH SAs within a single + IKE_SA. + + Ability to rekey SAs. + + To assure interoperability, all implementations MUST be capable of + parsing all payload types (if only to skip over them) and to ignore + payload types that it does not support unless the critical bit is set + in the payload header. If the critical bit is set in an unsupported + payload header, all implementations MUST reject the messages + containing those payloads. + + Every implementation MUST be capable of doing four-message + IKE_SA_INIT and IKE_AUTH exchanges establishing two SAs (one for IKE, + one for ESP and/or AH). Implementations MAY be initiate-only or + respond-only if appropriate for their platform. Every implementation + MUST be capable of responding to an INFORMATIONAL exchange, but a + minimal implementation MAY respond to any INFORMATIONAL message with + an empty INFORMATIONAL reply (note that within the context of an + IKE_SA, an "empty" message consists of an IKE header followed by an + Encrypted payload with no payloads contained in it). A minimal + implementation MAY support the CREATE_CHILD_SA exchange only in so + far as to recognize requests and reject them with a Notify payload of + type NO_ADDITIONAL_SAS. A minimal implementation need not be able to + initiate CREATE_CHILD_SA or INFORMATIONAL exchanges. When an SA + expires (based on locally configured values of either lifetime or + octets passed), and implementation MAY either try to renew it with a + CREATE_CHILD_SA exchange or it MAY delete (close) the old SA and + create a new one. If the responder rejects the CREATE_CHILD_SA + request with a NO_ADDITIONAL_SAS notification, the implementation + MUST be capable of instead closing the old SA and creating a new one. + + + + +Kaufman Standards Track [Page 86] + +RFC 4306 IKEv2 December 2005 + + + Implementations are not required to support requesting temporary IP + addresses or responding to such requests. If an implementation does + support issuing such requests, it MUST include a CP payload in + message 3 containing at least a field of type INTERNAL_IP4_ADDRESS or + INTERNAL_IP6_ADDRESS. All other fields are optional. If an + implementation supports responding to such requests, it MUST parse + the CP payload of type CFG_REQUEST in message 3 and recognize a field + of type INTERNAL_IP4_ADDRESS or INTERNAL_IP6_ADDRESS. If it supports + leasing an address of the appropriate type, it MUST return a CP + payload of type CFG_REPLY containing an address of the requested + type. The responder SHOULD include all of the other related + attributes if it has them. + + A minimal IPv4 responder implementation will ignore the contents of + the CP payload except to determine that it includes an + INTERNAL_IP4_ADDRESS attribute and will respond with the address and + other related attributes regardless of whether the initiator + requested them. + + A minimal IPv4 initiator will generate a CP payload containing only + an INTERNAL_IP4_ADDRESS attribute and will parse the response + ignoring attributes it does not know how to use. The only attribute + it MUST be able to process is INTERNAL_ADDRESS_EXPIRY, which it must + use to bound the lifetime of the SA unless it successfully renews the + lease before it expires. Minimal initiators need not be able to + request lease renewals and minimal responders need not respond to + them. + + For an implementation to be called conforming to this specification, + it MUST be possible to configure it to accept the following: + + PKIX Certificates containing and signed by RSA keys of size 1024 or + 2048 bits, where the ID passed is any of ID_KEY_ID, ID_FQDN, + ID_RFC822_ADDR, or ID_DER_ASN1_DN. + + Shared key authentication where the ID passes is any of ID_KEY_ID, + ID_FQDN, or ID_RFC822_ADDR. + + Authentication where the responder is authenticated using PKIX + Certificates and the initiator is authenticated using shared key + authentication. + + + + + + + + + + +Kaufman Standards Track [Page 87] + +RFC 4306 IKEv2 December 2005 + + +5. Security Considerations + + While this protocol is designed to minimize disclosure of + configuration information to unauthenticated peers, some such + disclosure is unavoidable. One peer or the other must identify + itself first and prove its identity first. To avoid probing, the + initiator of an exchange is required to identify itself first, and + usually is required to authenticate itself first. The initiator can, + however, learn that the responder supports IKE and what cryptographic + protocols it supports. The responder (or someone impersonating the + responder) can probe the initiator not only for its identity, but + using CERTREQ payloads may be able to determine what certificates the + initiator is willing to use. + + Use of EAP authentication changes the probing possibilities somewhat. + When EAP authentication is used, the responder proves its identity + before the initiator does, so an initiator that knew the name of a + valid initiator could probe the responder for both its name and + certificates. + + Repeated rekeying using CREATE_CHILD_SA without additional Diffie- + Hellman exchanges leaves all SAs vulnerable to cryptanalysis of a + single key or overrun of either endpoint. Implementers should take + note of this fact and set a limit on CREATE_CHILD_SA exchanges + between exponentiations. This memo does not prescribe such a limit. + + The strength of a key derived from a Diffie-Hellman exchange using + any of the groups defined here depends on the inherent strength of + the group, the size of the exponent used, and the entropy provided by + the random number generator used. Due to these inputs, it is + difficult to determine the strength of a key for any of the defined + groups. Diffie-Hellman group number two, when used with a strong + random number generator and an exponent no less than 200 bits, is + common for use with 3DES. Group five provides greater security than + group two. Group one is for historic purposes only and does not + provide sufficient strength except for use with DES, which is also + for historic use only. Implementations should make note of these + estimates when establishing policy and negotiating security + parameters. + + Note that these limitations are on the Diffie-Hellman groups + themselves. There is nothing in IKE that prohibits using stronger + groups nor is there anything that will dilute the strength obtained + from stronger groups (limited by the strength of the other algorithms + negotiated including the prf function). In fact, the extensible + framework of IKE encourages the definition of more groups; use of + elliptical curve groups may greatly increase strength using much + smaller numbers. + + + +Kaufman Standards Track [Page 88] + +RFC 4306 IKEv2 December 2005 + + + It is assumed that all Diffie-Hellman exponents are erased from + memory after use. In particular, these exponents MUST NOT be derived + from long-lived secrets like the seed to a pseudo-random generator + that is not erased after use. + + The strength of all keys is limited by the size of the output of the + negotiated prf function. For this reason, a prf function whose + output is less than 128 bits (e.g., 3DES-CBC) MUST NOT be used with + this protocol. + + The security of this protocol is critically dependent on the + randomness of the randomly chosen parameters. These should be + generated by a strong random or properly seeded pseudo-random source + (see [RFC4086]). Implementers should take care to ensure that use of + random numbers for both keys and nonces is engineered in a fashion + that does not undermine the security of the keys. + + For information on the rationale of many of the cryptographic design + choices in this protocol, see [SIGMA] and [SKEME]. Though the + security of negotiated CHILD_SAs does not depend on the strength of + the encryption and integrity protection negotiated in the IKE_SA, + implementations MUST NOT negotiate NONE as the IKE integrity + protection algorithm or ENCR_NULL as the IKE encryption algorithm. + + When using pre-shared keys, a critical consideration is how to assure + the randomness of these secrets. The strongest practice is to ensure + that any pre-shared key contain as much randomness as the strongest + key being negotiated. Deriving a shared secret from a password, + name, or other low-entropy source is not secure. These sources are + subject to dictionary and social engineering attacks, among others. + + The NAT_DETECTION_*_IP notifications contain a hash of the addresses + and ports in an attempt to hide internal IP addresses behind a NAT. + Since the IPv4 address space is only 32 bits, and it is usually very + sparse, it would be possible for an attacker to find out the internal + address used behind the NAT box by trying all possible IP addresses + and trying to find the matching hash. The port numbers are normally + fixed to 500, and the SPIs can be extracted from the packet. This + reduces the number of hash calculations to 2^32. With an educated + guess of the use of private address space, the number of hash + calculations is much smaller. Designers should therefore not assume + that use of IKE will not leak internal address information. + + When using an EAP authentication method that does not generate a + shared key for protecting a subsequent AUTH payload, certain man-in- + the-middle and server impersonation attacks are possible [EAPMITM]. + These vulnerabilities occur when EAP is also used in protocols that + are not protected with a secure tunnel. Since EAP is a general- + + + +Kaufman Standards Track [Page 89] + +RFC 4306 IKEv2 December 2005 + + + purpose authentication protocol, which is often used to provide + single-signon facilities, a deployed IPsec solution that relies on an + EAP authentication method that does not generate a shared key (also + known as a non-key-generating EAP method) can become compromised due + to the deployment of an entirely unrelated application that also + happens to use the same non-key-generating EAP method, but in an + unprotected fashion. Note that this vulnerability is not limited to + just EAP, but can occur in other scenarios where an authentication + infrastructure is reused. For example, if the EAP mechanism used by + IKEv2 utilizes a token authenticator, a man-in-the-middle attacker + could impersonate the web server, intercept the token authentication + exchange, and use it to initiate an IKEv2 connection. For this + reason, use of non-key-generating EAP methods SHOULD be avoided where + possible. Where they are used, it is extremely important that all + usages of these EAP methods SHOULD utilize a protected tunnel, where + the initiator validates the responder's certificate before initiating + the EAP exchange. Implementers SHOULD describe the vulnerabilities + of using non-key-generating EAP methods in the documentation of their + implementations so that the administrators deploying IPsec solutions + are aware of these dangers. + + An implementation using EAP MUST also use a public-key-based + authentication of the server to the client before the EAP exchange + begins, even if the EAP method offers mutual authentication. This + avoids having additional IKEv2 protocol variations and protects the + EAP data from active attackers. + + If the messages of IKEv2 are long enough that IP-level fragmentation + is necessary, it is possible that attackers could prevent the + exchange from completing by exhausting the reassembly buffers. The + chances of this can be minimized by using the Hash and URL encodings + instead of sending certificates (see section 3.6). Additional + mitigations are discussed in [KPS03]. + +6. IANA Considerations + + This document defines a number of new field types and values where + future assignments will be managed by the IANA. + + The following registries have been created by the IANA: + + IKEv2 Exchange Types (section 3.1) + IKEv2 Payload Types (section 3.2) + IKEv2 Transform Types (section 3.3.2) + IKEv2 Transform Attribute Types (section 3.3.2) + IKEv2 Encryption Transform IDs (section 3.3.2) + IKEv2 Pseudo-random Function Transform IDs (section 3.3.2) + IKEv2 Integrity Algorithm Transform IDs (section 3.3.2) + + + +Kaufman Standards Track [Page 90] + +RFC 4306 IKEv2 December 2005 + + + IKEv2 Diffie-Hellman Transform IDs (section 3.3.2) + IKEv2 Identification Payload ID Types (section 3.5) + IKEv2 Certificate Encodings (section 3.6) + IKEv2 Authentication Method (section 3.8) + IKEv2 Notify Message Types (section 3.10.1) + IKEv2 Notification IPCOMP Transform IDs (section 3.10.1) + IKEv2 Security Protocol Identifiers (section 3.3.1) + IKEv2 Traffic Selector Types (section 3.13.1) + IKEv2 Configuration Payload CFG Types (section 3.15) + IKEv2 Configuration Payload Attribute Types (section 3.15.1) + + Note: When creating a new Transform Type, a new registry for it must + be created. + + Changes and additions to any of those registries are by expert + review. + +7. Acknowledgements + + This document is a collaborative effort of the entire IPsec WG. If + there were no limit to the number of authors that could appear on an + RFC, the following, in alphabetical order, would have been listed: + Bill Aiello, Stephane Beaulieu, Steve Bellovin, Sara Bitan, Matt + Blaze, Ran Canetti, Darren Dukes, Dan Harkins, Paul Hoffman, John + Ioannidis, Charlie Kaufman, Steve Kent, Angelos Keromytis, Tero + Kivinen, Hugo Krawczyk, Andrew Krywaniuk, Radia Perlman, Omer + Reingold, and Michael Richardson. Many other people contributed to + the design. It is an evolution of IKEv1, ISAKMP, and the IPsec DOI, + each of which has its own list of authors. Hugh Daniel suggested the + feature of having the initiator, in message 3, specify a name for the + responder, and gave the feature the cute name "You Tarzan, Me Jane". + David Faucher and Valery Smyzlov helped refine the design of the + traffic selector negotiation. + +8. References + +8.1. Normative References + + [ADDGROUP] Kivinen, T. and M. Kojo, "More Modular Exponential (MODP) + Diffie-Hellman groups for Internet Key Exchange (IKE)", + RFC 3526, May 2003. + + [ADDRIPV6] Hinden, R. and S. Deering, "Internet Protocol Version 6 + (IPv6) Addressing Architecture", RFC 3513, April 2003. + + [Bra97] Bradner, S., "Key Words for use in RFCs to indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + + + +Kaufman Standards Track [Page 91] + +RFC 4306 IKEv2 December 2005 + + + [EAP] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H. + Levkowetz, "Extensible Authentication Protocol (EAP)", RFC + 3748, June 2004. + + [ESPCBC] Pereira, R. and R. Adams, "The ESP CBC-Mode Cipher + Algorithms", RFC 2451, November 1998. + + [Hutt05] Huttunen, A., Swander, B., Volpe, V., DiBurro, L., and M. + Stenberg, "UDP Encapsulation of IPsec ESP Packets", RFC + 3948, January 2005. + + [RFC2434] Narten, T. and H. Alvestrand, "Guidelines for Writing an + IANA Considerations Section in RFCs", BCP 26, RFC 2434, + October 1998. + + [RFC3168] Ramakrishnan, K., Floyd, S., and D. Black, "The Addition + of Explicit Congestion Notification (ECN) to IP", RFC + 3168, September 2001. + + [RFC3280] Housley, R., Polk, W., Ford, W., and D. Solo, "Internet + X.509 Public Key Infrastructure Certificate and + Certificate Revocation List (CRL) Profile", RFC 3280, + April 2002. + + [RFC4301] Kent, S. and K. Seo, "Security Architecture for the + Internet Protocol", RFC 4301, December 2005. + +8.2. Informative References + + [DES] ANSI X3.106, "American National Standard for Information + Systems-Data Link Encryption", American National Standards + Institute, 1983. + + [DH] Diffie, W., and Hellman M., "New Directions in + Cryptography", IEEE Transactions on Information Theory, V. + IT-22, n. 6, June 1977. + + [DHCP] Droms, R., "Dynamic Host Configuration Protocol", RFC + 2131, March 1997. + + [DSS] NIST, "Digital Signature Standard", FIPS 186, National + Institute of Standards and Technology, U.S. Department of + Commerce, May, 1994. + + [EAPMITM] Asokan, N., Nierni, V., and Nyberg, K., "Man-in-the-Middle + in Tunneled Authentication Protocols", + http://eprint.iacr.org/2002/163, November 2002. + + + + +Kaufman Standards Track [Page 92] + +RFC 4306 IKEv2 December 2005 + + + [HC98] Harkins, D. and D. Carrel, "The Internet Key Exchange + (IKE)", RFC 2409, November 1998. + + [IDEA] Lai, X., "On the Design and Security of Block Ciphers," + ETH Series in Information Processing, v. 1, Konstanz: + Hartung-Gorre Verlag, 1992. + + [IPCOMP] Shacham, A., Monsour, B., Pereira, R., and M. Thomas, "IP + Payload Compression Protocol (IPComp)", RFC 3173, + September 2001. + + [KPS03] Kaufman, C., Perlman, R., and Sommerfeld, B., "DoS + protection for UDP-based protocols", ACM Conference on + Computer and Communications Security, October 2003. + + [KBC96] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed- + Hashing for Message Authentication", RFC 2104, February + 1997. + + [LDAP] Wahl, M., Howes, T., and S Kille, "Lightweight Directory + Access Protocol (v3)", RFC 2251, December 1997. + + [MD5] Rivest, R., "The MD5 Message-Digest Algorithm", RFC 1321, + April 1992. + + [MSST98] Maughan, D., Schertler, M., Schneider, M., and J. Turner, + "Internet Security Association and Key Management Protocol + (ISAKMP)", RFC 2408, November 1998. + + [Orm96] Orman, H., "The OAKLEY Key Determination Protocol", RFC + 2412, November 1998. + + [PFKEY] McDonald, D., Metz, C., and B. Phan, "PF_KEY Key + Management API, Version 2", RFC 2367, July 1998. + + [PKCS1] Jonsson, J. and B. Kaliski, "Public-Key Cryptography + Standards (PKCS) #1: RSA Cryptography Specifications + Version 2.1", RFC 3447, February 2003. + + [PK01] Perlman, R., and Kaufman, C., "Analysis of the IPsec key + exchange Standard", WET-ICE Security Conference, MIT,2001, + http://sec.femto.org/wetice-2001/papers/radia-paper.pdf. + + [Pip98] Piper, D., "The Internet IP Security Domain Of + Interpretation for ISAKMP", RFC 2407, November 1998. + + + + + + +Kaufman Standards Track [Page 93] + +RFC 4306 IKEv2 December 2005 + + + [RADIUS] Rigney, C., Willens, S., Rubens, A., and W. Simpson, + "Remote Authentication Dial In User Service (RADIUS)", RFC + 2865, June 2000. + + [RFC4086] Eastlake, D., 3rd, Schiller, J., and S. Crocker, + "Randomness Requirements for Security", BCP 106, RFC 4086, + June 2005. + + [RFC1958] Carpenter, B., "Architectural Principles of the Internet", + RFC 1958, June 1996. + + [RFC2401] Kent, S. and R. Atkinson, "Security Architecture for the + Internet Protocol", RFC 2401, November 1998. + + [RFC2474] Nichols, K., Blake, S., Baker, F., and D. Black, + "Definition of the Differentiated Services Field (DS + Field) in the IPv4 and IPv6 Headers", RFC 2474, December + 1998. + + [RFC2475] Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z., + and W. Weiss, "An Architecture for Differentiated + Service", RFC 2475, December 1998. + + [RFC2522] Karn, P. and W. Simpson, "Photuris: Session-Key Management + Protocol", RFC 2522, March 1999. + + [RFC2775] Carpenter, B., "Internet Transparency", RFC 2775, February + 2000. + + [RFC2983] Black, D., "Differentiated Services and Tunnels", RFC + 2983, October 2000. + + [RFC3439] Bush, R. and D. Meyer, "Some Internet Architectural + Guidelines and Philosophy", RFC 3439, December 2002. + + [RFC3715] Aboba, B. and W. Dixon, "IPsec-Network Address Translation + (NAT) Compatibility Requirements", RFC 3715, March 2004. + + [RFC4302] Kent, S., "IP Authentication Header", RFC 4302, December + 2005. + + [RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)", RFC + 4303, December 2005. + + [RSA] Rivest, R., Shamir, A., and Adleman, L., "A Method for + Obtaining Digital Signatures and Public-Key + Cryptosystems", Communications of the ACM, v. 21, n. 2, + February 1978. + + + +Kaufman Standards Track [Page 94] + +RFC 4306 IKEv2 December 2005 + + + [SHA] NIST, "Secure Hash Standard", FIPS 180-1, National + Institute of Standards and Technology, U.S. Department of + Commerce, May 1994. + + [SIGMA] Krawczyk, H., "SIGMA: the `SIGn-and-MAc' Approach to + Authenticated Diffie-Hellman and its Use in the IKE + Protocols", in Advances in Cryptography - CRYPTO 2003 + Proceedings, LNCS 2729, Springer, 2003. Available at: + http://www.informatik.uni-trier.de/~ley/db/conf/ + crypto/crypto2003.html. + + [SKEME] Krawczyk, H., "SKEME: A Versatile Secure Key Exchange + Mechanism for Internet", from IEEE Proceedings of the 1996 + Symposium on Network and Distributed Systems Security. + + [X.501] ITU-T Recommendation X.501: Information Technology - Open + Systems Interconnection - The Directory: Models, 1993. + + [X.509] ITU-T Recommendation X.509 (1997 E): Information + Technology - Open Systems Interconnection - The Directory: + Authentication Framework, June 1997. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Kaufman Standards Track [Page 95] + +RFC 4306 IKEv2 December 2005 + + +Appendix A: Summary of changes from IKEv1 + + The goals of this revision to IKE are: + + 1) To define the entire IKE protocol in a single document, replacing + RFCs 2407, 2408, and 2409 and incorporating subsequent changes to + support NAT Traversal, Extensible Authentication, and Remote Address + acquisition; + + 2) To simplify IKE by replacing the eight different initial exchanges + with a single four-message exchange (with changes in authentication + mechanisms affecting only a single AUTH payload rather than + restructuring the entire exchange) see [PK01]; + + 3) To remove the Domain of Interpretation (DOI), Situation (SIT), and + Labeled Domain Identifier fields, and the Commit and Authentication + only bits; + + 4) To decrease IKE's latency in the common case by making the initial + exchange be 2 round trips (4 messages), and allowing the ability to + piggyback setup of a CHILD_SA on that exchange; + + 5) To replace the cryptographic syntax for protecting the IKE + messages themselves with one based closely on ESP to simplify + implementation and security analysis; + + 6) To reduce the number of possible error states by making the + protocol reliable (all messages are acknowledged) and sequenced. + This allows shortening CREATE_CHILD_SA exchanges from 3 messages to + 2; + + 7) To increase robustness by allowing the responder to not do + significant processing until it receives a message proving that the + initiator can receive messages at its claimed IP address, and not + commit any state to an exchange until the initiator can be + cryptographically authenticated; + + 8) To fix cryptographic weaknesses such as the problem with + symmetries in hashes used for authentication documented by Tero + Kivinen; + + 9) To specify Traffic Selectors in their own payloads type rather + than overloading ID payloads, and making more flexible the Traffic + Selectors that may be specified; + + 10) To specify required behavior under certain error conditions or + when data that is not understood is received, to make it easier to + make future revisions that do not break backward compatibility; + + + +Kaufman Standards Track [Page 96] + +RFC 4306 IKEv2 December 2005 + + + 11) To simplify and clarify how shared state is maintained in the + presence of network failures and Denial of Service attacks; and + + 12) To maintain existing syntax and magic numbers to the extent + possible to make it likely that implementations of IKEv1 can be + enhanced to support IKEv2 with minimum effort. + +Appendix B: Diffie-Hellman Groups + + There are two Diffie-Hellman groups defined here for use in IKE. + These groups were generated by Richard Schroeppel at the University + of Arizona. Properties of these primes are described in [Orm96]. + + The strength supplied by group one may not be sufficient for the + mandatory-to-implement encryption algorithm and is here for historic + reasons. + + Additional Diffie-Hellman groups have been defined in [ADDGROUP]. + +B.1. Group 1 - 768 Bit MODP + + This group is assigned id 1 (one). + + The prime is: 2^768 - 2 ^704 - 1 + 2^64 * { [2^638 pi] + 149686 } Its + hexadecimal value is: + + FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1 29024E08 + 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD EF9519B3 CD3A431B + 302B0A6D F25F1437 4FE1356D 6D51C245 E485B576 625E7EC6 F44C42E9 + A63A3620 FFFFFFFF FFFFFFFF + + The generator is 2. + +B.2. Group 2 - 1024 Bit MODP + + This group is assigned id 2 (two). + + The prime is 2^1024 - 2^960 - 1 + 2^64 * { [2^894 pi] + 129093 }. + Its hexadecimal value is: + + FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1 29024E08 + 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD EF9519B3 CD3A431B + 302B0A6D F25F1437 4FE1356D 6D51C245 E485B576 625E7EC6 F44C42E9 + A637ED6B 0BFF5CB6 F406B7ED EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 + 49286651 ECE65381 FFFFFFFF FFFFFFFF + + The generator is 2. + + + + +Kaufman Standards Track [Page 97] + +RFC 4306 IKEv2 December 2005 + + +Editor's Address + + Charlie Kaufman + Microsoft Corporation + 1 Microsoft Way + Redmond, WA 98052 + + Phone: 1-425-707-3335 + EMail: charliek@microsoft.com + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Kaufman Standards Track [Page 98] + +RFC 4306 IKEv2 December 2005 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2005). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at ietf- + ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + +Kaufman Standards Track [Page 99] + diff --git a/doc/standards/rfc4307.txt b/doc/standards/rfc4307.txt new file mode 100644 index 000000000..5617a2551 --- /dev/null +++ b/doc/standards/rfc4307.txt @@ -0,0 +1,339 @@ + + + + + + +Network Working Group J. Schiller +Request for Comments: 4307 Massachusetts Institute of Technology +Category: Standards Track December 2005 + + + Cryptographic Algorithms for Use in the + Internet Key Exchange Version 2 (IKEv2) + +Status of This Memo + + This document specifies an Internet standards track protocol for the + Internet community, and requests discussion and suggestions for + improvements. Please refer to the current edition of the "Internet + Official Protocol Standards" (STD 1) for the standardization state + and status of this protocol. Distribution of this memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2005). + +Abstract + + The IPsec series of protocols makes use of various cryptographic + algorithms in order to provide security services. The Internet Key + Exchange (IKE (RFC 2409) and IKEv2) provide a mechanism to negotiate + which algorithms should be used in any given association. However, + to ensure interoperability between disparate implementations, it is + necessary to specify a set of mandatory-to-implement algorithms to + ensure that there is at least one algorithm that all implementations + will have available. This document defines the current set of + algorithms that are mandatory to implement as part of IKEv2, as well + as algorithms that should be implemented because they may be promoted + to mandatory at some future time. + +1. Introduction + + The Internet Key Exchange protocol provides for the negotiation of + cryptographic algorithms between both endpoints of a cryptographic + + association. Different implementations of IPsec and IKE may provide + different algorithms. However, the IETF desires that all + implementations should have some way to interoperate. In particular, + this requires that IKE define a set of mandatory-to-implement + algorithms because IKE itself uses such algorithms as part of its own + negotiations. This requires that some set of algorithms be specified + as "mandatory-to-implement" for IKE. + + + + + +Schiller Standards Track [Page 1] + +RFC 4307 IKEv2 Cryptographic Algorithms December 2005 + + + The nature of cryptography is that new algorithms surface + continuously and existing algorithms are continuously attacked. An + algorithm believed to be strong today may be demonstrated to be weak + tomorrow. Given this, the choice of mandatory-to-implement algorithm + should be conservative so as to minimize the likelihood of it being + compromised quickly. Thought should also be given to performance + considerations as many uses of IPsec will be in environments where + performance is a concern. + + Finally, we need to recognize that the mandatory-to-implement + algorithm(s) may need to change over time to adapt to the changing + world. For this reason, the selection of mandatory-to-implement + algorithms was removed from the main IKEv2 specification and placed + in this document. As the choice of algorithm changes, only this + document should need to be updated. + + Ideally, the mandatory-to-implement algorithm of tomorrow should + already be available in most implementations of IPsec by the time it + is made mandatory. To facilitate this, we will attempt to identify + those algorithms (that are known today) in this document. There is + no guarantee that the algorithms we believe today may be mandatory in + the future will in fact become so. All algorithms known today are + subject to cryptographic attack and may be broken in the future. + +2. Requirements Terminology + + Keywords "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT", and + "MAY" that appear in this document are to be interpreted as described + in [RFC2119]. + + We define some additional terms here: + + SHOULD+ This term means the same as SHOULD. However, it is likely + that an algorithm marked as SHOULD+ will be promoted at + some future time to be a MUST. + + SHOULD- This term means the same as SHOULD. However, an algorithm + marked as SHOULD- may be deprecated to a MAY in a future + version of this document. + + MUST- This term means the same as MUST. However, we expect at + some point that this algorithm will no longer be a MUST in + a future document. Although its status will be determined + at a later time, it is reasonable to expect that if a + future revision of a document alters the status of a MUST- + algorithm, it will remain at least a SHOULD or a SHOULD-. + + + + + +Schiller Standards Track [Page 2] + +RFC 4307 IKEv2 Cryptographic Algorithms December 2005 + + +3. Algorithm Selection + +3.1. IKEv2 Algorithm Selection + +3.1.1. Encrypted Payload Algorithms + + The IKEv2 Encrypted Payload requires both a confidentiality algorithm + and an integrity algorithm. For confidentiality, implementations + MUST- implement 3DES-CBC and SHOULD+ implement AES-128-CBC. For + integrity, HMAC-SHA1 MUST be implemented. + +3.1.2. Diffie-Hellman Groups + + There are several Modular Exponential (MODP) groups that are defined + for use in IKEv2. They are defined in both the [IKEv2] base document + and in the MODP extensions document. They are identified by group + number. Any groups not listed here are considered as "MAY be + implemented". + + Group Number Bit Length Status Defined + 2 1024 MODP Group MUST- [RFC2409] + 14 2048 MODP Group SHOULD+ [RFC3526] + +3.1.3. IKEv2 Transform Type 1 Algorithms + + IKEv2 defines several possible algorithms for Transfer Type 1 + (encryption). These are defined below with their implementation + status. + + Name Number Defined In Status + RESERVED 0 + ENCR_3DES 3 [RFC2451] MUST- + ENCR_NULL 11 [RFC2410] MAY + ENCR_AES_CBC 12 [AES-CBC] SHOULD+ + ENCR_AES_CTR 13 [AES-CTR] SHOULD + +3.1.4. IKEv2 Transform Type 2 Algorithms + + Transfer Type 2 Algorithms are pseudo-random functions used to + generate random values when needed. + + Name Number Defined In Status + RESERVED 0 + PRF_HMAC_MD5 1 [RFC2104] MAY + PRF_HMAC_SHA1 2 [RFC2104] MUST + PRF_AES128_CBC 4 [AESPRF] SHOULD+ + + + + + +Schiller Standards Track [Page 3] + +RFC 4307 IKEv2 Cryptographic Algorithms December 2005 + + +3.1.5. IKEv2 Transform Type 3 Algorithms + + Transfer Type 3 Algorithms are Integrity algorithms used to protect + data against tampering. + + Name Number Defined In Status + NONE 0 + AUTH_HMAC_MD5_96 1 [RFC2403] MAY + AUTH_HMAC_SHA1_96 2 [RFC2404] MUST + AUTH_AES_XCBC_96 5 [AES-MAC] SHOULD+ + +4. Security Considerations + + The security of cryptographic-based systems depends on both the + strength of the cryptographic algorithms chosen and the strength of + the keys used with those algorithms. The security also depends on + the engineering of the protocol used by the system to ensure that + there are no non-cryptographic ways to bypass the security of the + overall system. + + This document concerns itself with the selection of cryptographic + algorithms for the use of IKEv2, specifically with the selection of + "mandatory-to-implement" algorithms. The algorithms identified in + this document as "MUST implement" or "SHOULD implement" are not known + to be broken at the current time, and cryptographic research so far + leads us to believe that they will likely remain secure into the + foreseeable future. However, this isn't necessarily forever. We + would therefore expect that new revisions of this document will be + issued from time to time that reflect the current best practice in + this area. + +5. Normative References + + [RFC2409] Harkins, D. and D. Carrel, "The Internet Key Exchange + (IKE)", RFC 2409, November 1998. + + [IKEv2] Kaufman, C., Ed., "Internet Key Exchange (IKEv2) + Protocol", RFC 4306, December 2005. + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + [RFC3526] Kivinen, T. and M. Kojo, "More Modular Exponential + (MODP) Diffie-Hellman groups for Internet Key Exchange + (IKE)", RFC 3526, May 2003. + + [RFC2451] Pereira, R. and R. Adams, "The ESP CBC-Mode Cipher + Algorithms", RFC 2451, November 1998. + + + +Schiller Standards Track [Page 4] + +RFC 4307 IKEv2 Cryptographic Algorithms December 2005 + + + [RFC2410] Glenn, R. and S. Kent, "The NULL Encryption Algorithm + and Its Use With IPsec", RFC 2410, November 1998. + + [AES-CBC] Frankel, S., Glenn, R., and S. Kelly, "The AES-CBC + Cipher Algorithm and Its Use with IPsec", RFC 3602, + September 2003. + + [AES-CTR] Housley, R., "Using Advanced Encryption Standard (AES) + Counter Mode With IPsec Encapsulating Security Payload + (ESP)", RFC 3686, January 2004. + + [RFC2104] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: + Keyed-Hashing for Message Authentication", RFC 2104, + February 1997. + + [AESPRF] Hoffman, P., "The AES-XCBC-PRF-128 Algorithm for the + Internet Key Exchange Protocol (IKE)", RFC 3664, January + 2004. + + [RFC2403] Madson, C. and R. Glenn, "The Use of HMAC-MD5-96 within + ESP and AH", RFC 2403, November 1998. + + [RFC2404] Madson, C. and R. Glenn, "The Use of HMAC-SHA-1-96 + within ESP and AH", RFC 2404, November 1998. + + [AES-MAC] Frankel, S. and H. Herbert, "The AES-XCBC-MAC-96 + Algorithm and Its Use With IPsec", RFC 3566, September + 2003. + +Author's Address + + Jeffrey I. Schiller + Massachusetts Institute of Technology + Room W92-190 + 77 Massachusetts Avenue + Cambridge, MA 02139-4307 + USA + + Phone: +1 (617) 253-0161 + EMail: jis@mit.edu + + + + + + + + + + + +Schiller Standards Track [Page 5] + +RFC 4307 IKEv2 Cryptographic Algorithms December 2005 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2005). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at ietf- + ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + +Schiller Standards Track [Page 6] + diff --git a/doc/standards/rfc4478.txt b/doc/standards/rfc4478.txt new file mode 100644 index 000000000..45bf32536 --- /dev/null +++ b/doc/standards/rfc4478.txt @@ -0,0 +1,283 @@ + + + + + + +Network Working Group Y. Nir +Request for Comments: 4478 Check Point +Category: Experimental April 2006 + + + Repeated Authentication in Internet Key Exchange (IKEv2) Protocol + +Status of This Memo + + This memo defines an Experimental Protocol for the Internet + community. It does not specify an Internet standard of any kind. + Discussion and suggestions for improvement are requested. + Distribution of this memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2006). + +Abstract + + This document extends the Internet Key Exchange (IKEv2) Protocol + document [IKEv2]. With some IPsec peers, particularly in the remote + access scenario, it is desirable to repeat the mutual authentication + periodically. The purpose of this is to limit the time that security + associations (SAs) can be used by a third party who has gained + control of the IPsec peer. This document describes a mechanism to + perform this function. + +1. Introduction + + In several cases, such as the remote access scenario, policy dictates + that the mutual authentication needs to be repeated periodically. + Repeated authentication can usually be achieved by simply repeating + the Initial exchange by whichever side has a stricter policy. + + However, in the remote access scenario it is usually up to a human + user to supply the authentication credentials, and often Extensible + Authentication Protocol (EAP) is used for authentication, which makes + it unreasonable or impossible for the remote access gateway to + initiate the IKEv2 exchange. + + This document describes a new notification that the original + Responder can send to the original Initiator with the number of + seconds before the authentication needs to be repeated. The + Initiator SHOULD repeat the Initial exchange before that time is + expired. If the Initiator fails to do so, the Responder may close + all Security Associations. + + + + +Nir Experimental [Page 1] + +RFC 4478 Repeated Authentication in IKEv2 April 2006 + + + Repeated authentication is not the same as IKE SA rekeying, and need + not be tied to it. The key words "MUST", "MUST NOT", "SHOULD", + "SHOULD NOT", and "MAY" in this document are to be interpreted as + described in [RFC2119]. + +2. Authentication Lifetime + + The Responder in an IKEv2 negotiation MAY be configured to limit the + time that an IKE SA and the associated IPsec SAs may be used before + the peer is required to repeat the authentication, through a new + Initial Exchange. + + The Responder MUST send this information to the Initiator in an + AUTH_LIFETIME notification either in the last message of an IKE_AUTH + exchange, or in an INFORMATIONAL request, which may be sent at any + time. + + When sent as part of the IKE SA setup, the AUTH_LIFETIME notification + is used as follows: + + Initiator Responder + ------------------------------- ----------------------------- + HDR, SAi1, KEi, Ni --> + <-- HDR, SAr1, KEr, Nr, [CERTREQ] + HDR, SK {IDi, [CERT,] [CERTREQ,] + [IDr,] AUTH, SAi2, TSi, TSr} --> + <-- HDR, SK {IDr, [CERT,] AUTH, + SAr2, TSi, TSr, + N(AUTH_LIFETIME)} + + The separate Informational exchange is formed as follows: + + <-- HDR, SK {N(AUTH_LIFETIME)} + HDR SK {} --> + + The AUTH_LIFETIME notification is described in Section 3. + + The original Responder that sends the AUTH_LIFETIME notification + SHOULD send a DELETE notification soon after the end of the lifetime + period, unless the IKE SA is deleted before the lifetime period + elapses. If the IKE SA is rekeyed, then the time limit applies to + the new SA. + + An Initiator that received an AUTH_LIFETIME notification SHOULD + repeat the Initial exchange within the time indicated in the + notification. The time is measured from the time that the original + Initiator receives the notification. + + + + +Nir Experimental [Page 2] + +RFC 4478 Repeated Authentication in IKEv2 April 2006 + + + A special case is where the notification is sent in an Informational + exchange, and the lifetime is zero. In that case, the original + responder SHOULD allow a reasonable time for the repeated + authentication to occur. + + The AUTH_LIFETIME notification MUST be protected and MAY be sent by + the original Responder at any time. If the policy changes, the + original Responder MAY send it again in a new Informational. + + The new Initial exchange is not altered. The initiator SHOULD delete + the old IKE SA within a reasonable time of the new Auth exchange. + +3. AUTH_LIFETIME Notification + + The AUTH_LIFETIME message is a notification payload formatted as + follows: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Next Payload !C! RESERVED ! Payload Length ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Protocol ID ! SPI Size ! Notify Message Type ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + ! Lifetime ! + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + o Payload Length is 12. + o Protocol ID (1 octet) MUST be 0. + o SPI size is 0 (SPI is in message header). + o Notify Message type is 16403 by IANA. + o Lifetime is the amount of time (in seconds) left before the + peer should repeat the Initial exchange. A zero value + signifies that the Initial exchange should begin immediately. + It is usually not reasonable to set this value to less than 300 + (5 minutes) since that is too cumbersome for a user. + It is also usually not reasonable to set this value to more + than 86400 (1 day) as that would negate the security benefit of + repeating the authentication. + +4. Interoperability with Non-Supporting IKEv2 Implementations + + IKEv2 implementations that do not support the AUTH_LIFETIME + notification will ignore it and will not repeat the authentication. + In that case the original Responder will send a Delete notification + for the IKE SA in an Informational exchange. Such implementations + may be configured manually to repeat the authentication periodically. + + + + +Nir Experimental [Page 3] + +RFC 4478 Repeated Authentication in IKEv2 April 2006 + + + Non-supporting Responders are not a problem because they will simply + not send these notifications. In that case, there is no requirement + that the original Initiator re-authenticate. + +5. Security Considerations + + The AUTH_LIFETIME notification sent by the Responder does not + override any security policy on the Initiator. In particular, the + Initiator may have a different policy regarding re-authentication, + requiring more frequent re-authentication. Such an Initiator can + repeat the authentication earlier then is required by the + notification. + + An Initiator MAY set reasonable limits on the amount of time in the + AUTH_LIFETIME notification. For example, an authentication lifetime + of less than 300 seconds from SA initiation may be considered + unreasonable. + +6. IANA Considerations + + The IANA has assigned a notification payload type for the + AUTH_LIFETIME notifications from the IKEv2 Notify Message Types + registry. + +7. Normative References + + [IKEv2] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol", RFC + 4306, December 2005. + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + +Author's Address + + Yoav Nir + Check Point Software Technologies + + EMail: ynir@checkpoint.com + + + + + + + + + + + + + +Nir Experimental [Page 4] + +RFC 4478 Repeated Authentication in IKEv2 April 2006 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2006). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at + ietf-ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is provided by the IETF + Administrative Support Activity (IASA). + + + + + + + +Nir Experimental [Page 5] + diff --git a/doc/standards/rfc4718.txt b/doc/standards/rfc4718.txt new file mode 100644 index 000000000..35ad6986d --- /dev/null +++ b/doc/standards/rfc4718.txt @@ -0,0 +1,3251 @@ + + + + + + +Network Working Group P. Eronen +Request for Comments: 4718 Nokia +Category: Informational P. Hoffman + VPN Consortium + October 2006 + + + IKEv2 Clarifications and Implementation Guidelines + +Status of This Memo + + This memo provides information for the Internet community. It does + not specify an Internet standard of any kind. Distribution of this + memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2006). + +Abstract + + This document clarifies many areas of the IKEv2 specification. It + does not to introduce any changes to the protocol, but rather + provides descriptions that are less prone to ambiguous + interpretations. The purpose of this document is to encourage the + development of interoperable implementations. + + + + + + + + + + + + + + + + + + + + + + + + + +Eronen & Hoffman Informational [Page 1] + +RFC 4718 IKEv2 Clarifications October 2006 + + +Table of Contents + + 1. Introduction ....................................................4 + 2. Creating the IKE_SA .............................................4 + 2.1. SPI Values in IKE_SA_INIT Exchange .........................4 + 2.2. Message IDs for IKE_SA_INIT Messages .......................5 + 2.3. Retransmissions of IKE_SA_INIT Requests ....................5 + 2.4. Interaction of COOKIE and INVALID_KE_PAYLOAD ...............6 + 2.5. Invalid Cookies ............................................8 + 3. Authentication ..................................................9 + 3.1. Data Included in AUTH Payload Calculation ..................9 + 3.2. Hash Function for RSA Signatures ...........................9 + 3.3. Encoding Method for RSA Signatures ........................10 + 3.4. Identification Type for EAP ...............................11 + 3.5. Identity for Policy Lookups When Using EAP ................11 + 3.6. Certificate Encoding Types ................................12 + 3.7. Shared Key Authentication and Fixed PRF Key Size ..........12 + 3.8. EAP Authentication and Fixed PRF Key Size .................13 + 3.9. Matching ID Payloads to Certificate Contents ..............13 + 3.10. Message IDs for IKE_AUTH Messages ........................14 + 4. Creating CHILD_SAs .............................................14 + 4.1. Creating SAs with the CREATE_CHILD_SA Exchange ............14 + 4.2. Creating an IKE_SA without a CHILD_SA .....................16 + 4.3. Diffie-Hellman for First CHILD_SA .........................16 + 4.4. Extended Sequence Numbers (ESN) Transform .................17 + 4.5. Negotiation of ESP_TFC_PADDING_NOT_SUPPORTED ..............17 + 4.6. Negotiation of NON_FIRST_FRAGMENTS_ALSO ...................18 + 4.7. Semantics of Complex Traffic Selector Payloads ............18 + 4.8. ICMP Type/Code in Traffic Selector Payloads ...............19 + 4.9. Mobility Header in Traffic Selector Payloads ..............20 + 4.10. Narrowing the Traffic Selectors ..........................20 + 4.11. SINGLE_PAIR_REQUIRED .....................................21 + 4.12. Traffic Selectors Violating Own Policy ...................21 + 4.13. Traffic Selector Authorization ...........................22 + 5. Rekeying and Deleting SAs ......................................23 + 5.1. Rekeying SAs with the CREATE_CHILD_SA Exchange ............23 + 5.2. Rekeying the IKE_SA vs. Reauthentication ..................24 + 5.3. SPIs When Rekeying the IKE_SA .............................25 + 5.4. SPI When Rekeying a CHILD_SA ..............................25 + 5.5. Changing PRFs When Rekeying the IKE_SA ....................26 + 5.6. Deleting vs. Closing SAs ..................................26 + 5.7. Deleting a CHILD_SA Pair ..................................26 + 5.8. Deleting an IKE_SA ........................................27 + 5.9. Who is the original initiator of IKE_SA ...................27 + 5.10. Comparing Nonces .........................................27 + 5.11. Exchange Collisions ......................................28 + 5.12. Diffie-Hellman and Rekeying the IKE_SA ...................36 + + + + +Eronen & Hoffman Informational [Page 2] + +RFC 4718 IKEv2 Clarifications October 2006 + + + 6. Configuration Payloads .........................................37 + 6.1. Assigning IP Addresses ....................................37 + 6.2. Requesting any INTERNAL_IP4/IP6_ADDRESS ...................38 + 6.3. INTERNAL_IP4_SUBNET/INTERNAL_IP6_SUBNET ...................38 + 6.4. INTERNAL_IP4_NETMASK ......................................41 + 6.5. Configuration Payloads for IPv6 ...........................42 + 6.6. INTERNAL_IP6_NBNS .........................................43 + 6.7. INTERNAL_ADDRESS_EXPIRY ...................................43 + 6.8. Address Assignment Failures ...............................44 + 7. Miscellaneous Issues ...........................................45 + 7.1. Matching ID_IPV4_ADDR and ID_IPV6_ADDR ....................45 + 7.2. Relationship of IKEv2 to RFC 4301 .........................45 + 7.3. Reducing the Window Size ..................................46 + 7.4. Minimum Size of Nonces ....................................46 + 7.5. Initial Zero Octets on Port 4500 ..........................46 + 7.6. Destination Port for NAT Traversal ........................47 + 7.7. SPI Values for Messages outside an IKE_SA .................47 + 7.8. Protocol ID/SPI Fields in Notify Payloads .................48 + 7.9. Which message should contain INITIAL_CONTACT ..............48 + 7.10. Alignment of Payloads ....................................48 + 7.11. Key Length Transform Attribute ...........................48 + 7.12. IPsec IANA Considerations ................................49 + 7.13. Combining ESP and AH .....................................50 + 8. Implementation Mistakes ........................................50 + 9. Security Considerations ........................................51 + 10. Acknowledgments ...............................................51 + 11. References ....................................................51 + 11.1. Normative References .....................................51 + 11.2. Informative References ...................................52 + Appendix A. Exchanges and Payloads ................................54 + A.1. IKE_SA_INIT Exchange ......................................54 + A.2. IKE_AUTH Exchange without EAP .............................54 + A.3. IKE_AUTH Exchange with EAP ................................55 + A.4. CREATE_CHILD_SA Exchange for Creating/Rekeying + CHILD_SAs .................................................56 + A.5. CREATE_CHILD_SA Exchange for Rekeying the IKE_SA ..........56 + A.6. INFORMATIONAL Exchange ....................................56 + + + + + + + + + + + + + + +Eronen & Hoffman Informational [Page 3] + +RFC 4718 IKEv2 Clarifications October 2006 + + +1. Introduction + + This document clarifies many areas of the IKEv2 specification that + may be difficult to understand to developers not intimately familiar + with the specification and its history. The clarifications in this + document come from the discussion on the IPsec WG mailing list, from + experience in interoperability testing, and from implementation + issues that have been brought to the editors' attention. + + IKEv2/IPsec can be used for several different purposes, including + IPsec-based remote access (sometimes called the "road warrior" case), + site-to-site virtual private networks (VPNs), and host-to-host + protection of application traffic. While this document attempts to + consider all of these uses, the remote access scenario has perhaps + received more attention here than the other uses. + + This document does not place any requirements on anyone and does not + use [RFC2119] keywords such as "MUST" and "SHOULD", except in + quotations from the original IKEv2 documents. The requirements are + given in the IKEv2 specification [IKEv2] and IKEv2 cryptographic + algorithms document [IKEv2ALG]. + + In this document, references to a numbered section (such as "Section + 2.15") mean that section in [IKEv2]. References to mailing list + messages or threads refer to the IPsec WG mailing list at + ipsec@ietf.org. Archives of the mailing list can be found at + <http://www.ietf.org/mail-archive/web/ipsec/index.html>. + +2. Creating the IKE_SA + +2.1. SPI Values in IKE_SA_INIT Exchange + + Normal IKE messages include the initiator's and responder's Security + Parameter Indexes (SPIs), both of which are non-zero, in the IKE + header. However, there are some corner cases where the IKEv2 + specification is not fully consistent about what values should be + used. + + First, Section 3.1 says that the Responder's SPI "...MUST NOT be zero + in any other message" (than the first message of the IKE_SA_INIT + exchange). However, the figure in Section 2.6 shows the second + IKE_SA_INIT message as "HDR(A,0), N(COOKIE)", contradicting the text + in 3.1. + + Since the responder's SPI identifies security-related state held by + the responder, and in this case no state is created, sending a zero + value seems reasonable. + + + + +Eronen & Hoffman Informational [Page 4] + +RFC 4718 IKEv2 Clarifications October 2006 + + + Second, in addition to cookies, there are several other cases when + the IKE_SA_INIT exchange does not result in the creation of an IKE_SA + (for instance, INVALID_KE_PAYLOAD or NO_PROPOSAL_CHOSEN). What + responder SPI value should be used in the IKE_SA_INIT response in + this case? + + Since the IKE_SA_INIT request always has a zero responder SPI, the + value will not be actually used by the initiator. Thus, we think + sending a zero value is correct also in this case. + + If the responder sends a non-zero responder SPI, the initiator should + not reject the response only for that reason. However, when retrying + the IKE_SA_INIT request, the initiator will use a zero responder SPI, + as described in Section 3.1: "Responder's SPI [...] This value MUST + be zero in the first message of an IKE Initial Exchange (including + repeats of that message including a cookie) [...]". We believe the + intent was to cover repeats of that message due to other reasons, + such as INVALID_KE_PAYLOAD, as well. + + (References: "INVALID_KE_PAYLOAD and clarifications document" thread, + Sep-Oct 2005.) + +2.2. Message IDs for IKE_SA_INIT Messages + + The Message ID for IKE_SA_INIT messages is always zero. This + includes retries of the message due to responses such as COOKIE and + INVALID_KE_PAYLOAD. + + This is because Message IDs are part of the IKE_SA state, and when + the responder replies to IKE_SA_INIT request with N(COOKIE) or + N(INVALID_KE_PAYLOAD), the responder does not allocate any state. + + (References: "Question about N(COOKIE) and N(INVALID_KE_PAYLOAD) + combination" thread, Oct 2004. Tero Kivinen's mail "Comments of + draft-eronen-ipsec-ikev2-clarifications-02.txt", 2005-04-05.) + +2.3. Retransmissions of IKE_SA_INIT Requests + + When a responder receives an IKE_SA_INIT request, it has to determine + whether the packet is a retransmission belonging to an existing + "half-open" IKE_SA (in which case the responder retransmits the same + response), or a new request (in which case the responder creates a + new IKE_SA and sends a fresh response). + + The specification does not describe in detail how this determination + is done. In particular, it is not sufficient to use the initiator's + SPI and/or IP address for this purpose: two different peers behind a + single NAT could choose the same initiator SPI (and the probability + + + +Eronen & Hoffman Informational [Page 5] + +RFC 4718 IKEv2 Clarifications October 2006 + + + of this happening is not necessarily small, since IKEv2 does not + require SPIs to be chosen randomly). Instead, the responder should + do the IKE_SA lookup using the whole packet or its hash (or at the + minimum, the Ni payload which is always chosen randomly). + + For all other packets than IKE_SA_INIT requests, looking up right + IKE_SA is of course done based on the recipient's SPI (either the + initiator or responder SPI depending on the value of the Initiator + bit in the IKE header). + +2.4. Interaction of COOKIE and INVALID_KE_PAYLOAD + + There are two common reasons why the initiator may have to retry the + IKE_SA_INIT exchange: the responder requests a cookie or wants a + different Diffie-Hellman group than was included in the KEi payload. + Both of these cases are quite simple alone, but it is not totally + obvious what happens when they occur at the same time, that is, the + IKE_SA_INIT exchange is retried several times. + + The main question seems to be the following: if the initiator + receives a cookie from the responder, should it include the cookie in + only the next retry of the IKE_SA_INIT request, or in all subsequent + retries as well? Section 3.10.1 says that: + + "This notification MUST be included in an IKE_SA_INIT request + retry if a COOKIE notification was included in the initial + response." + + This could be interpreted as saying that when a cookie is received in + the initial response, it is included in all retries. On the other + hand, Section 2.6 says that: + + "Initiators who receive such responses MUST retry the + IKE_SA_INIT with a Notify payload of type COOKIE containing + the responder supplied cookie data as the first payload and + all other payloads unchanged." + + Including the same cookie in later retries makes sense only if the + "all other payloads unchanged" restriction applies only to the first + retry, but not to subsequent retries. + + It seems that both interpretations can peacefully coexist. If the + initiator includes the cookie only in the next retry, one additional + roundtrip may be needed in some cases: + + + + + + + +Eronen & Hoffman Informational [Page 6] + +RFC 4718 IKEv2 Clarifications October 2006 + + + Initiator Responder + ----------- ----------- + HDR(A,0), SAi1, KEi, Ni --> + <-- HDR(A,0), N(COOKIE) + HDR(A,0), N(COOKIE), SAi1, KEi, Ni --> + <-- HDR(A,0), N(INVALID_KE_PAYLOAD) + HDR(A,0), SAi1, KEi', Ni --> + <-- HDR(A,0), N(COOKIE') + HDR(A,0), N(COOKIE'), SAi1, KEi',Ni --> + <-- HDR(A,B), SAr1, KEr, Nr + + An additional roundtrip is needed also if the initiator includes the + cookie in all retries, but the responder does not support this + functionality. For instance, if the responder includes the SAi1 and + KEi payloads in cookie calculation, it will reject the request by + sending a new cookie (see also Section 2.5 of this document for more + text about invalid cookies): + + + Initiator Responder + ----------- ----------- + HDR(A,0), SAi1, KEi, Ni --> + <-- HDR(A,0), N(COOKIE) + HDR(A,0), N(COOKIE), SAi1, KEi, Ni --> + <-- HDR(A,0), N(INVALID_KE_PAYLOAD) + HDR(A,0), N(COOKIE), SAi1, KEi', Ni --> + <-- HDR(A,0), N(COOKIE') + HDR(A,0), N(COOKIE'), SAi1, KEi',Ni --> + <-- HDR(A,B), SAr1, KEr, Nr + + If both peers support including the cookie in all retries, a slightly + shorter exchange can happen: + + Initiator Responder + ----------- ----------- + HDR(A,0), SAi1, KEi, Ni --> + <-- HDR(A,0), N(COOKIE) + HDR(A,0), N(COOKIE), SAi1, KEi, Ni --> + <-- HDR(A,0), N(INVALID_KE_PAYLOAD) + HDR(A,0), N(COOKIE), SAi1, KEi', Ni --> + <-- HDR(A,B), SAr1, KEr, Nr + + This document recommends that implementations should support this + shorter exchange, but it must not be assumed the other peer also + supports the shorter exchange. + + + + + + +Eronen & Hoffman Informational [Page 7] + +RFC 4718 IKEv2 Clarifications October 2006 + + + In theory, even this exchange has one unnecessary roundtrip, as both + the cookie and Diffie-Hellman group could be checked at the same + time: + + Initiator Responder + ----------- ----------- + HDR(A,0), SAi1, KEi, Ni --> + <-- HDR(A,0), N(COOKIE), + N(INVALID_KE_PAYLOAD) + HDR(A,0), N(COOKIE), SAi1, KEi',Ni --> + <-- HDR(A,B), SAr1, KEr, Nr + + However, it is clear that this case is not allowed by the text in + Section 2.6, since "all other payloads" clearly includes the KEi + payload as well. + + (References: "INVALID_KE_PAYLOAD and clarifications document" thread, + Sep-Oct 2005.) + +2.5. Invalid Cookies + + There has been some confusion what should be done when an IKE_SA_INIT + request containing an invalid cookie is received ("invalid" in the + sense that its contents do not match the value expected by the + responder). + + The correct action is to ignore the cookie and process the message as + if no cookie had been included (usually this means sending a response + containing a new cookie). This is shown in Section 2.6 when it says + "The responder in that case MAY reject the message by sending another + response with a new cookie [...]". + + Other possible actions, such as ignoring the whole request (or even + all requests from this IP address for some time), create strange + failure modes even in the absence of any malicious attackers and do + not provide any additional protection against DoS attacks. + + (References: "Invalid Cookie" thread, Sep-Oct 2005.) + + + + + + + + + + + + + +Eronen & Hoffman Informational [Page 8] + +RFC 4718 IKEv2 Clarifications October 2006 + + +3. Authentication + +3.1. Data Included in AUTH Payload Calculation + + Section 2.15 describes how the AUTH payloads are calculated; this + calculation involves values prf(SK_pi,IDi') and prf(SK_pr,IDr'). The + text describes the method in words, but does not give clear + definitions of what is signed or MACed (i.e., protected with a + message authentication code). + + The initiator's signed octets can be described as: + + InitiatorSignedOctets = RealMessage1 | NonceRData | MACedIDForI + GenIKEHDR = [ four octets 0 if using port 4500 ] | RealIKEHDR + RealIKEHDR = SPIi | SPIr | . . . | Length + RealMessage1 = RealIKEHDR | RestOfMessage1 + NonceRPayload = PayloadHeader | NonceRData + InitiatorIDPayload = PayloadHeader | RestOfIDPayload + RestOfInitIDPayload = IDType | RESERVED | InitIDData + MACedIDForI = prf(SK_pi, RestOfInitIDPayload) + + The responder's signed octets can be described as: + + ResponderSignedOctets = RealMessage2 | NonceIData | MACedIDForR + GenIKEHDR = [ four octets 0 if using port 4500 ] | RealIKEHDR + RealIKEHDR = SPIi | SPIr | . . . | Length + RealMessage2 = RealIKEHDR | RestOfMessage2 + NonceIPayload = PayloadHeader | NonceIData + ResponderIDPayload = PayloadHeader | RestOfIDPayload + RestOfRespIDPayload = IDType | RESERVED | InitIDData + MACedIDForR = prf(SK_pr, RestOfRespIDPayload) + +3.2. Hash Function for RSA Signatures + + Section 3.8 says that RSA digital signature is "Computed as specified + in section 2.15 using an RSA private key over a PKCS#1 padded hash." + + Unlike IKEv1, IKEv2 does not negotiate a hash function for the + IKE_SA. The algorithm for signatures is selected by the signing + party who, in general, may not know beforehand what algorithms the + verifying party supports. Furthermore, [IKEv2ALG] does not say what + algorithms implementations are required or recommended to support. + This clearly has a potential for causing interoperability problems, + since authentication will fail if the signing party selects an + algorithm that is not supported by the verifying party, or not + acceptable according to the verifying party's policy. + + + + + +Eronen & Hoffman Informational [Page 9] + +RFC 4718 IKEv2 Clarifications October 2006 + + + This document recommends that all implementations support SHA-1 and + use SHA-1 as the default hash function when generating the + signatures, unless there are good reasons (such as explicit manual + configuration) to believe that the peer supports something else. + + Note that hash function collision attacks are not important for the + AUTH payloads, since they are not intended for third-party + verification, and the data includes fresh nonces. See [HashUse] for + more discussion about hash function attacks and IPsec. + + Another reasonable choice would be to use the hash function that was + used by the CA when signing the peer certificate. However, this does + not guarantee that the IKEv2 peer would be able to validate the AUTH + payload, because the same code might not be used to validate + certificate signatures and IKEv2 message signatures, and these two + routines may support a different set of hash algorithms. The peer + could be configured with a fingerprint of the certificate, or + certificate validation could be performed by an external entity using + [SCVP]. Furthermore, not all CERT payloads types include a + signature, and the certificate could be signed with some algorithm + other than RSA. + + Note that unlike IKEv1, IKEv2 uses the PKCS#1 v1.5 [PKCS1v20] + signature encoding method (see next section for details), which + includes the algorithm identifier for the hash algorithm. Thus, when + the verifying party receives the AUTH payload it can at least + determine which hash function was used. + + (References: Magnus Alstrom's mail "RE:", 2005-01-03. Pasi Eronen's + reply, 2005-01-04. Tero Kivinen's reply, 2005-01-04. "First draft + of IKEv2.1" thread, Dec 2005/Jan 2006.) + +3.3. Encoding Method for RSA Signatures + + Section 3.8 says that the RSA digital signature is "Computed as + specified in section 2.15 using an RSA private key over a PKCS#1 + padded hash." + + The PKCS#1 specification [PKCS1v21] defines two different encoding + methods (ways of "padding the hash") for signatures. However, the + Internet-Draft approved by the IESG had a reference to the older + PKCS#1 v2.0 [PKCS1v20]. That version has only one encoding method + for signatures (EMSA-PKCS1-v1_5), and thus there is no ambiguity. + + + + + + + + +Eronen & Hoffman Informational [Page 10] + +RFC 4718 IKEv2 Clarifications October 2006 + + + Note that this encoding method is different from the encoding method + used in IKEv1. If future revisions of IKEv2 provide support for + other encoding methods (such as EMSA-PSS), they will be given new + Auth Method numbers. + + (References: Pasi Eronen's mail "RE:", 2005-01-04.) + +3.4. Identification Type for EAP + + Section 3.5 defines several different types for identification + payloads, including, e.g., ID_FQDN, ID_RFC822_ADDR, and ID_KEY_ID. + EAP [EAP] does not mandate the use of any particular type of + identifier, but often EAP is used with Network Access Identifiers + (NAIs) defined in [NAI]. Although NAIs look a bit like email + addresses (e.g., "joe@example.com"), the syntax is not exactly the + same as the syntax of email address in [RFC822]. This raises the + question of which identification type should be used. + + This document recommends that ID_RFC822_ADDR identification type is + used for those NAIs that include the realm component. Therefore, + responder implementations should not attempt to verify that the + contents actually conform to the exact syntax given in [RFC822] or + [RFC2822], but instead should accept any reasonable looking NAI. + + For NAIs that do not include the realm component, this document + recommends using the ID_KEY_ID identification type. + + (References: "need your help on this IKEv2/i18n/EAP issue" and "IKEv2 + identifier issue with EAP" threads, Aug 2004.) + +3.5. Identity for Policy Lookups When Using EAP + + When the initiator authentication uses EAP, it is possible that the + contents of the IDi payload is used only for AAA routing purposes and + selecting which EAP method to use. This value may be different from + the identity authenticated by the EAP method (see [EAP], Sections 5.1 + and 7.3). + + It is important that policy lookups and access control decisions use + the actual authenticated identity. Often the EAP server is + implemented in a separate AAA server that communicates with the IKEv2 + responder using, e.g., RADIUS [RADEAP]. In this case, the + authenticated identity has to be sent from the AAA server to the + IKEv2 responder. + + (References: Pasi Eronen's mail "RE: Reauthentication in IKEv2", + 2004-10-28. "Policy lookups" thread, Oct/Nov 2004. RFC 3748, + Section 7.3.) + + + +Eronen & Hoffman Informational [Page 11] + +RFC 4718 IKEv2 Clarifications October 2006 + + +3.6. Certificate Encoding Types + + Section 3.6 defines a total of twelve different certificate encoding + types, and continues that "Specific syntax is for some of the + certificate type codes above is not defined in this document." + However, the text does not provide references to other documents that + would contain information about the exact contents and use of those + values. + + Without this information, it is not possible to develop interoperable + implementations. Therefore, this document recommends that the + following certificate encoding values should not be used before new + specifications that specify their use are available. + + PKCS #7 wrapped X.509 certificate 1 + PGP Certificate 2 + DNS Signed Key 3 + Kerberos Token 6 + SPKI Certificate 9 + + This document recommends that most implementations should use only + those values that are "MUST"/"SHOULD" requirements in [IKEv2]; i.e., + "X.509 Certificate - Signature" (4), "Raw RSA Key" (11), "Hash and + URL of X.509 certificate" (12), and "Hash and URL of X.509 bundle" + (13). + + Furthermore, Section 3.7 says that the "Certificate Encoding" field + for the Certificate Request payload uses the same values as for + Certificate payload. However, the contents of the "Certification + Authority" field are defined only for X.509 certificates (presumably + covering at least types 4, 10, 12, and 13). This document recommends + that other values should not be used before new specifications that + specify their use are available. + + The "Raw RSA Key" type needs one additional clarification. Section + 3.6 says it contains "a PKCS #1 encoded RSA key". What this means is + a DER-encoded RSAPublicKey structure from PKCS#1 [PKCS1v21]. + +3.7. Shared Key Authentication and Fixed PRF Key Size + + Section 2.15 says that "If the negotiated prf takes a fixed-size key, + the shared secret MUST be of that fixed size". This statement is + correct: the shared secret must be of the correct size. If it is + not, it cannot be used; there is no padding, truncation, or other + processing involved to force it to that correct size. + + + + + + +Eronen & Hoffman Informational [Page 12] + +RFC 4718 IKEv2 Clarifications October 2006 + + + This requirement means that it is difficult to use these pseudo- + random functions (PRFs) with shared key authentication. The authors + think this part of the specification was very poorly thought out, and + using PRFs with a fixed key size is likely to result in + interoperability problems. Thus, we recommend that such PRFs should + not be used with shared key authentication. PRF_AES128_XCBC + [RFC3664] originally used fixed key sizes; that RFC has been updated + to handle variable key sizes in [RFC4434]. + + Note that Section 2.13 also contains text that is related to PRFs + with fixed key size: "When the key for the prf function has fixed + length, the data provided as a key is truncated or padded with zeros + as necessary unless exceptional processing is explained following the + formula". However, this text applies only to the prf+ construction, + so it does not contradict the text in Section 2.15. + + (References: Paul Hoffman's mail "Re: ikev2-07: last nits", + 2003-05-02. Hugo Krawczyk's reply, 2003-05-12. Thread "Question + about PRFs with fixed size key", Jan 2005.) + +3.8. EAP Authentication and Fixed PRF Key Size + + As described in the previous section, PRFs with a fixed key size + require a shared secret of exactly that size. This restriction + applies also to EAP authentication. For instance, a PRF that + requires a 128-bit key cannot be used with EAP since [EAP] specifies + that the MSK is at least 512 bits long. + + (References: Thread "Question about PRFs with fixed size key", Jan + 2005.) + +3.9. Matching ID Payloads to Certificate Contents + + In IKEv1, there was some confusion about whether or not the + identities in certificates used to authenticate IKE were required to + match the contents of the ID payloads. The PKI4IPsec Working Group + produced the document [PKI4IPsec] which covers this topic in much + more detail. However, Section 3.5 of [IKEv2] explicitly says that + the ID payload "does not necessarily have to match anything in the + CERT payload". + + + + + + + + + + + +Eronen & Hoffman Informational [Page 13] + +RFC 4718 IKEv2 Clarifications October 2006 + + +3.10. Message IDs for IKE_AUTH Messages + + According to Section 2.2, "The IKE_SA initial setup messages will + always be numbered 0 and 1." That is true when the IKE_AUTH exchange + does not use EAP. When EAP is used, each pair of messages has their + message numbers incremented. The first pair of AUTH messages will + have an ID of 1, the second will be 2, and so on. + + (References: "Question about MsgID in AUTH exchange" thread, April + 2005.) + +4. Creating CHILD_SAs + +4.1. Creating SAs with the CREATE_CHILD_SA Exchange + + Section 1.3's organization does not lead to clear understanding of + what is needed in which environment. The section can be reorganized + with subsections for each use of the CREATE_CHILD_SA exchange + (creating child SAs, rekeying IKE SAs, and rekeying child SAs.) + + The new Section 1.3 with subsections and the above changes might look + like the following. + + NEW-1.3 The CREATE_CHILD_SA Exchange + + The CREATE_CHILD_SA Exchange is used to create new CHILD_SAs and + to rekey both IKE_SAs and CHILD_SAs. This exchange consists of + a single request/response pair, and some of its function was + referred to as a phase 2 exchange in IKEv1. It MAY be initiated + by either end of the IKE_SA after the initial exchanges are + completed. + + All messages following the initial exchange are + cryptographically protected using the cryptographic algorithms + and keys negotiated in the first two messages of the IKE + exchange. These subsequent messages use the syntax of the + Encrypted Payload described in section 3.14. All subsequent + messages include an Encrypted Payload, even if they are referred + to in the text as "empty". + + The CREATE_CHILD_SA is used for rekeying IKE_SAs and CHILD_SAs. + This section describes the first part of rekeying, the creation + of new SAs; Section 2.8 covers the mechanics of rekeying, + including moving traffic from old to new SAs and the deletion of + the old SAs. The two sections must be read together to + understand the entire process of rekeying. + + + + + +Eronen & Hoffman Informational [Page 14] + +RFC 4718 IKEv2 Clarifications October 2006 + + + Either endpoint may initiate a CREATE_CHILD_SA exchange, so in + this section the term initiator refers to the endpoint + initiating this exchange. An implementation MAY refuse all + CREATE_CHILD_SA requests within an IKE_SA. + + The CREATE_CHILD_SA request MAY optionally contain a KE payload + for an additional Diffie-Hellman exchange to enable stronger + guarantees of forward secrecy for the CHILD_SA or IKE_SA. The + keying material for the SA is a function of SK_d established + during the establishment of the IKE_SA, the nonces exchanged + during the CREATE_CHILD_SA exchange, and the Diffie-Hellman + value (if KE payloads are included in the CREATE_CHILD_SA + exchange). The details are described in sections 2.17 and 2.18. + + If a CREATE_CHILD_SA exchange includes a KEi payload, at least + one of the SA offers MUST include the Diffie-Hellman group of + the KEi. The Diffie-Hellman group of the KEi MUST be an element + of the group the initiator expects the responder to accept + (additional Diffie-Hellman groups can be proposed). If the + responder rejects the Diffie-Hellman group of the KEi payload, + the responder MUST reject the request and indicate its preferred + Diffie-Hellman group in the INVALID_KE_PAYLOAD Notification + payload. In the case of such a rejection, the CREATE_CHILD_SA + exchange fails, and the initiator SHOULD retry the exchange with + a Diffie-Hellman proposal and KEi in the group that the + responder gave in the INVALID_KE_PAYLOAD. + + NEW-1.3.1 Creating New CHILD_SAs with the CREATE_CHILD_SA Exchange + + A CHILD_SA may be created by sending a CREATE_CHILD_SA request. + The CREATE_CHILD_SA request for creating a new CHILD_SA is: + + Initiator Responder + ----------- ----------- + HDR, SK {[N+], SA, Ni, [KEi], + TSi, TSr} --> + + The initiator sends SA offer(s) in the SA payload, a nonce in + the Ni payload, optionally a Diffie-Hellman value in the KEi + payload, and the proposed traffic selectors for the proposed + CHILD_SA in the TSi and TSr payloads. The request can also + contain Notify payloads that specify additional details for the + CHILD_SA: these include IPCOMP_SUPPORTED, USE_TRANSPORT_MODE, + ESP_TFC_PADDING_NOT_SUPPORTED, and NON_FIRST_FRAGMENTS_ALSO. + + + + + + + +Eronen & Hoffman Informational [Page 15] + +RFC 4718 IKEv2 Clarifications October 2006 + + + The CREATE_CHILD_SA response for creating a new CHILD_SA is: + + <-- HDR, SK {[N+], SA, Nr, + [KEr], TSi, TSr} + + The responder replies with the accepted offer in an SA payload, + and a Diffie-Hellman value in the KEr payload if KEi was + included in the request and the selected cryptographic suite + includes that group. As with the request, optional Notification + payloads can specify additional details for the CHILD_SA. + + The traffic selectors for traffic to be sent on that SA are + specified in the TS payloads in the response, which may be a + subset of what the initiator of the CHILD_SA proposed. + + The text about rekeying SAs can be found in Section 5.1 of this + document. + +4.2. Creating an IKE_SA without a CHILD_SA + + CHILD_SAs can be created either by being piggybacked on the IKE_AUTH + exchange, or using a separate CREATE_CHILD_SA exchange. The + specification is not clear about what happens if creating the + CHILD_SA during the IKE_AUTH exchange fails for some reason. + + Our recommendation in this situation is that the IKE_SA is created as + usual. This is also in line with how the CREATE_CHILD_SA exchange + works: a failure to create a CHILD_SA does not close the IKE_SA. + + The list of responses in the IKE_AUTH exchange that do not prevent an + IKE_SA from being set up include at least the following: + NO_PROPOSAL_CHOSEN, TS_UNACCEPTABLE, SINGLE_PAIR_REQUIRED, + INTERNAL_ADDRESS_FAILURE, and FAILED_CP_REQUIRED. + + (References: "Questions about internal address" thread, April 2005.) + +4.3. Diffie-Hellman for First CHILD_SA + + Section 1.2 shows that IKE_AUTH messages do not contain KEi/KEr or + Ni/Nr payloads. This implies that the SA payload in IKE_AUTH + exchange cannot contain Transform Type 4 (Diffie-Hellman Group) with + any other value than NONE. Implementations should probably leave the + transform out entirely in this case. + + + + + + + + +Eronen & Hoffman Informational [Page 16] + +RFC 4718 IKEv2 Clarifications October 2006 + + +4.4. Extended Sequence Numbers (ESN) Transform + + The description of the ESN transform in Section 3.3 has be proved + difficult to understand. The ESN transform has the following + meaning: + + o A proposal containing one ESN transform with value 0 means "do not + use extended sequence numbers". + + o A proposal containing one ESN transform with value 1 means "use + extended sequence numbers". + + o A proposal containing two ESN transforms with values 0 and 1 means + "I support both normal and extended sequence numbers, you choose". + (Obviously this case is only allowed in requests; the response + will contain only one ESN transform.) + + In most cases, the exchange initiator will include either the first + or third alternative in its SA payload. The second alternative is + rarely useful for the initiator: it means that using normal sequence + numbers is not acceptable (so if the responder does not support ESNs, + the exchange will fail with NO_PROPOSAL_CHOSEN). + + Note that including the ESN transform is mandatory when creating + ESP/AH SAs (it was optional in earlier drafts of the IKEv2 + specification). + + (References: "Technical change needed to IKEv2 before publication", + "STRAW POLL: Dealing with the ESN negotiation interop issue in IKEv2" + and "Results of straw poll regarding: IKEv2 interoperability issue" + threads, March-April 2005.) + +4.5. Negotiation of ESP_TFC_PADDING_NOT_SUPPORTED + + The description of ESP_TFC_PADDING_NOT_SUPPORTED notification in + Section 3.10.1 says that "This notification asserts that the sending + endpoint will NOT accept packets that contain Flow Confidentiality + (TFC) padding". + + However, the text does not say in which messages this notification + should be included, or whether the scope of this notification is a + single CHILD_SA or all CHILD_SAs of the peer. + + Our interpretation is that the scope is a single CHILD_SA, and thus + this notification is included in messages containing an SA payload + negotiating a CHILD_SA. If neither endpoint accepts TFC padding, + this notification will be included in both the request proposing an + SA and the response accepting it. If this notification is included + + + +Eronen & Hoffman Informational [Page 17] + +RFC 4718 IKEv2 Clarifications October 2006 + + + in only one of the messages, TFC padding can still be sent in one + direction. + +4.6. Negotiation of NON_FIRST_FRAGMENTS_ALSO + + NON_FIRST_FRAGMENTS_ALSO notification is described in Section 3.10.1 + simply as "Used for fragmentation control. See [RFC4301] for + explanation." + + [RFC4301] says "Implementations that will transmit non-initial + fragments on a tunnel mode SA that makes use of non-trivial port (or + ICMP type/code or MH type) selectors MUST notify a peer via the IKE + NOTIFY NON_FIRST_FRAGMENTS_ALSO payload. The peer MUST reject this + proposal if it will not accept non-initial fragments in this context. + If an implementation does not successfully negotiate transmission of + non-initial fragments for such an SA, it MUST NOT send such fragments + over the SA." + + However, it is not clear exactly how the negotiation works. Our + interpretation is that the negotiation works the same way as for + IPCOMP_SUPPORTED and USE_TRANSPORT_MODE: sending non-first fragments + is enabled only if NON_FIRST_FRAGMENTS_ALSO notification is included + in both the request proposing an SA and the response accepting it. + In other words, if the peer "rejects this proposal", it only omits + NON_FIRST_FRAGMENTS_ALSO notification from the response, but does not + reject the whole CHILD_SA creation. + +4.7. Semantics of Complex Traffic Selector Payloads + + As described in Section 3.13, the TSi/TSr payloads can include one or + more individual traffic selectors. + + There is no requirement that TSi and TSr contain the same number of + individual traffic selectors. Thus, they are interpreted as follows: + a packet matches a given TSi/TSr if it matches at least one of the + individual selectors in TSi, and at least one of the individual + selectors in TSr. + + For instance, the following traffic selectors: + + TSi = ((17, 100, 192.0.1.66-192.0.1.66), + (17, 200, 192.0.1.66-192.0.1.66)) + TSr = ((17, 300, 0.0.0.0-255.255.255.255), + (17, 400, 0.0.0.0-255.255.255.255)) + + would match UDP packets from 192.0.1.66 to anywhere, with any of the + four combinations of source/destination ports (100,300), (100,400), + (200,300), and (200, 400). + + + +Eronen & Hoffman Informational [Page 18] + +RFC 4718 IKEv2 Clarifications October 2006 + + + This implies that some types of policies may require several CHILD_SA + pairs. For instance, a policy matching only source/destination ports + (100,300) and (200,400), but not the other two combinations, cannot + be negotiated as a single CHILD_SA pair using IKEv2. + + (References: "IKEv2 Traffic Selectors?" thread, Feb 2005.) + +4.8. ICMP Type/Code in Traffic Selector Payloads + + The traffic selector types 7 and 8 can also refer to ICMP type and + code fields. As described in Section 3.13.1, "For the ICMP protocol, + the two one-octet fields Type and Code are treated as a single 16-bit + integer (with Type in the most significant eight bits and Code in the + least significant eight bits) port number for the purposes of + filtering based on this field." + + Since ICMP packets do not have separate source and destination port + fields, there is some room for confusion what exactly the four TS + payloads (two in the request, two in the response, each containing + both start and end port fields) should contain. + + The answer to this question can be found from [RFC4301] Section + 4.4.1.3. + + To give a concrete example, if a host at 192.0.1.234 wants to create + a transport mode SA for sending "Destination Unreachable" packets + (ICMPv4 type 3) to 192.0.2.155, but is not willing to receive them + over this SA pair, the CREATE_CHILD_SA exchange would look like this: + + Initiator Responder + ----------- ----------- + HDR, SK { N(USE_TRANSPORT_MODE), SA, Ni, + TSi(1, 0x0300-0x03FF, 192.0.1.234-192.0.1.234), + TSr(1, 65535-0, 192.0.2.155-192.0.2.155) } --> + + <-- HDR, SK { N(USE_TRANSPORT_MODE), SA, Nr, + TSi(1, 0x0300-0x03FF, 192.0.1.234-192.0.1.234), + TSr(1, 65535-0, 192.0.2.155-192.0.2.155) } + + Since IKEv2 always creates IPsec SAs in pairs, two SAs are also + created in this case, even though the second SA is never used for + data traffic. + + An exchange creating an SA pair that can be used both for sending and + receiving "Destination Unreachable" places the same value in all the + port: + + + + + +Eronen & Hoffman Informational [Page 19] + +RFC 4718 IKEv2 Clarifications October 2006 + + + Initiator Responder + ----------- ----------- + HDR, SK { N(USE_TRANSPORT_MODE), SA, Ni, + TSi(1, 0x0300-0x03FF, 192.0.1.234-192.0.1.234), + TSr(1, 0x0300-0x03FF, 192.0.2.155-192.0.2.155) } --> + + <-- HDR, SK { N(USE_TRANSPORT_MODE), SA, Nr, + TSi(1, 0x0300-0x03FF, 192.0.1.234-192.0.1.234), + TSr(1, 0x0300-0x03FF, 192.0.2.155-192.0.2.155) } + + (References: "ICMP and MH TSs for IKEv2" thread, Sep 2005.) + +4.9. Mobility Header in Traffic Selector Payloads + + Traffic selectors can use IP Protocol ID 135 to match the IPv6 + mobility header [MIPv6]. However, the IKEv2 specification does not + define how to represent the "MH Type" field in traffic selectors. + + At some point, it was expected that this will be defined in a + separate document later. However, [RFC4301] says that "For IKE, the + IPv6 mobility header message type (MH type) is placed in the most + significant eight bits of the 16 bit local "port" selector". The + direction semantics of TSi/TSr port fields are the same as for ICMP + and are described in the previous section. + + (References: Tero Kivinen's mail "Issue #86: Add IPv6 mobility header + message type as selector", 2003-10-14. "ICMP and MH TSs for IKEv2" + thread, Sep 2005.) + +4.10. Narrowing the Traffic Selectors + + Section 2.9 describes how traffic selectors are negotiated when + creating a CHILD_SA. A more concise summary of the narrowing process + is presented below. + + o If the responder's policy does not allow any part of the traffic + covered by TSi/TSr, it responds with TS_UNACCEPTABLE. + + o If the responder's policy allows the entire set of traffic covered + by TSi/TSr, no narrowing is necessary, and the responder can + return the same TSi/TSr values. + + o Otherwise, narrowing is needed. If the responder's policy allows + all traffic covered by TSi[1]/TSr[1] (the first traffic selectors + in TSi/TSr) but not entire TSi/TSr, the responder narrows to an + acceptable subset of TSi/TSr that includes TSi[1]/TSr[1]. + + + + + +Eronen & Hoffman Informational [Page 20] + +RFC 4718 IKEv2 Clarifications October 2006 + + + o If the responder's policy does not allow all traffic covered by + TSi[1]/TSr[1], but does allow some parts of TSi/TSr, it narrows to + an acceptable subset of TSi/TSr. + + In the last two cases, there may be several subsets that are + acceptable (but their union is not); in this case, the responder + arbitrarily chooses one of them and includes ADDITIONAL_TS_POSSIBLE + notification in the response. + +4.11. SINGLE_PAIR_REQUIRED + + The description of the SINGLE_PAIR_REQUIRED notify payload in + Sections 2.9 and 3.10.1 is not fully consistent. + + We do not attempt to describe this payload in this document either, + since it is expected that most implementations will not have policies + that require separate SAs for each address pair. + + Thus, if only some part (or parts) of the TSi/TSr proposed by the + initiator is (are) acceptable to the responder, most responders + should simply narrow TSi/TSr to an acceptable subset (as described in + the last two paragraphs of Section 2.9), rather than use + SINGLE_PAIR_REQUIRED. + +4.12. Traffic Selectors Violating Own Policy + + Section 2.9 describes traffic selector negotiation in great detail. + One aspect of this negotiation that may need some clarification is + that when creating a new SA, the initiator should not propose traffic + selectors that violate its own policy. If this rule is not followed, + valid traffic may be dropped. + + This is best illustrated by an example. Suppose that host A has a + policy whose effect is that traffic to 192.0.1.66 is sent via host B + encrypted using Advanced Encryption Standard (AES), and traffic to + all other hosts in 192.0.1.0/24 is also sent via B, but encrypted + using Triple Data Encryption Standard (3DES). Suppose also that host + B accepts any combination of AES and 3DES. + + If host A now proposes an SA that uses 3DES, and includes TSr + containing (192.0.1.0-192.0.1.0.255), this will be accepted by host + B. Now, host B can also use this SA to send traffic from 192.0.1.66, + but those packets will be dropped by A since it requires the use of + AES for those traffic. Even if host A creates a new SA only for + 192.0.1.66 that uses AES, host B may freely continue to use the first + SA for the traffic. In this situation, when proposing the SA, host A + should have followed its own policy, and included a TSr containing + ((192.0.1.0-192.0.1.65),(192.0.1.67-192.0.1.255)) instead. + + + +Eronen & Hoffman Informational [Page 21] + +RFC 4718 IKEv2 Clarifications October 2006 + + + In general, if (1) the initiator makes a proposal "for traffic X + (TSi/TSr), do SA", and (2) for some subset X' of X, the initiator + does not actually accept traffic X' with SA, and (3) the initiator + would be willing to accept traffic X' with some SA' (!=SA), valid + traffic can be unnecessarily dropped since the responder can apply + either SA or SA' to traffic X'. + + (References: "Question about "narrowing" ..." thread, Feb 2005. + "IKEv2 needs a "policy usage mode"..." thread, Feb 2005. "IKEv2 + Traffic Selectors?" thread, Feb 2005. "IKEv2 traffic selector + negotiation examples", 2004-08-08.) + +4.13. Traffic Selector Authorization + + IKEv2 relies on information in the Peer Authorization Database (PAD) + when determining what kind of IPsec SAs a peer is allowed to create. + This process is described in [RFC4301] Section 4.4.3. When a peer + requests the creation of an IPsec SA with some traffic selectors, the + PAD must contain "Child SA Authorization Data" linking the identity + authenticated by IKEv2 and the addresses permitted for traffic + selectors. + + For example, the PAD might be configured so that authenticated + identity "sgw23.example.com" is allowed to create IPsec SAs for + 192.0.2.0/24, meaning this security gateway is a valid + "representative" for these addresses. Host-to-host IPsec requires + similar entries, linking, for example, "fooserver4.example.com" with + 192.0.1.66/32, meaning this identity a valid "owner" or + "representative" of the address in question. + + As noted in [RFC4301], "It is necessary to impose these constraints + on creation of child SAs to prevent an authenticated peer from + spoofing IDs associated with other, legitimate peers." In the + example given above, a correct configuration of the PAD prevents + sgw23 from creating IPsec SAs with address 192.0.1.66 and prevents + fooserver4 from creating IPsec SAs with addresses from 192.0.2.0/24. + + It is important to note that simply sending IKEv2 packets using some + particular address does not imply a permission to create IPsec SAs + with that address in the traffic selectors. For example, even if + sgw23 would be able to spoof its IP address as 192.0.1.66, it could + not create IPsec SAs matching fooserver4's traffic. + + The IKEv2 specification does not specify how exactly IP address + assignment using configuration payloads interacts with the PAD. Our + interpretation is that when a security gateway assigns an address + + + + + +Eronen & Hoffman Informational [Page 22] + +RFC 4718 IKEv2 Clarifications October 2006 + + + using configuration payloads, it also creates a temporary PAD entry + linking the authenticated peer identity and the newly allocated inner + address. + + It has been recognized that configuring the PAD correctly may be + difficult in some environments. For instance, if IPsec is used + between a pair of hosts whose addresses are allocated dynamically + using Dynamic Host Configuration Protocol (DHCP), it is extremely + difficult to ensure that the PAD specifies the correct "owner" for + each IP address. This would require a mechanism to securely convey + address assignments from the DHCP server and link them to identities + authenticated using IKEv2. + + Due to this limitation, some vendors have been known to configure + their PADs to allow an authenticated peer to create IPsec SAs with + traffic selectors containing the same address that was used for the + IKEv2 packets. In environments where IP spoofing is possible (i.e., + almost everywhere) this essentially allows any peer to create IPsec + SAs with any traffic selectors. This is not an appropriate or secure + configuration in most circumstances. See [Aura05] for an extensive + discussion about this issue, and the limitations of host-to-host + IPsec in general. + +5. Rekeying and Deleting SAs + +5.1. Rekeying SAs with the CREATE_CHILD_SA Exchange + + Continued from Section 4.1 of this document. + + NEW-1.3.2 Rekeying IKE_SAs with the CREATE_CHILD_SA Exchange + + The CREATE_CHILD_SA request for rekeying an IKE_SA is: + + Initiator Responder + ----------- ----------- + HDR, SK {SA, Ni, [KEi]} --> + + The initiator sends SA offer(s) in the SA payload, a nonce in + the Ni payload, and optionally a Diffie-Hellman value in the KEi + payload. + + The CREATE_CHILD_SA response for rekeying an IKE_SA is: + + <-- HDR, SK {SA, Nr, [KEr]} + + + + + + + +Eronen & Hoffman Informational [Page 23] + +RFC 4718 IKEv2 Clarifications October 2006 + + + The responder replies (using the same Message ID to respond) + with the accepted offer in an SA payload, a nonce in the Nr + payload, and, optionally, a Diffie-Hellman value in the KEr + payload. + + The new IKE_SA has its message counters set to 0, regardless of + what they were in the earlier IKE_SA. The window size starts at + 1 for any new IKE_SA. The new initiator and responder SPIs are + supplied in the SPI fields of the SA payloads. + + NEW-1.3.3 Rekeying CHILD_SAs with the CREATE_CHILD_SA Exchange + + The CREATE_CHILD_SA request for rekeying a CHILD_SA is: + + Initiator Responder + ----------- ----------- + HDR, SK {N(REKEY_SA), [N+], SA, + Ni, [KEi], TSi, TSr} --> + + The leading Notify payload of type REKEY_SA identifies the + CHILD_SA being rekeyed, and it contains the SPI that the initiator + expects in the headers of inbound packets. In addition, the + initiator sends SA offer(s) in the SA payload, a nonce in the Ni + payload, optionally a Diffie-Hellman value in the KEi payload, + and the proposed traffic selectors in the TSi and TSr payloads. + The request can also contain Notify payloads that specify + additional details for the CHILD_SA. + + The CREATE_CHILD_SA response for rekeying a CHILD_SA is: + + <-- HDR, SK {[N+], SA, Nr, + [KEr], TSi, TSr} + + The responder replies with the accepted offer in an SA payload, + and a Diffie-Hellman value in the KEr payload if KEi was + included in the request and the selected cryptographic suite + includes that group. + + The traffic selectors for traffic to be sent on that SA are + specified in the TS payloads in the response, which may be a + subset of what the initiator of the CHILD_SA proposed. + +5.2. Rekeying the IKE_SA vs. Reauthentication + + Rekeying the IKE_SA and reauthentication are different concepts in + IKEv2. Rekeying the IKE_SA establishes new keys for the IKE_SA and + resets the Message ID counters, but it does not authenticate the + parties again (no AUTH or EAP payloads are involved). + + + +Eronen & Hoffman Informational [Page 24] + +RFC 4718 IKEv2 Clarifications October 2006 + + + While rekeying the IKE_SA may be important in some environments, + reauthentication (the verification that the parties still have access + to the long-term credentials) is often more important. + + IKEv2 does not have any special support for reauthentication. + Reauthentication is done by creating a new IKE_SA from scratch (using + IKE_SA_INIT/IKE_AUTH exchanges, without any REKEY_SA notify + payloads), creating new CHILD_SAs within the new IKE_SA (without + REKEY_SA notify payloads), and finally deleting the old IKE_SA (which + deletes the old CHILD_SAs as well). + + This means that reauthentication also establishes new keys for the + IKE_SA and CHILD_SAs. Therefore, while rekeying can be performed + more often than reauthentication, the situation where "authentication + lifetime" is shorter than "key lifetime" does not make sense. + + While creation of a new IKE_SA can be initiated by either party + (initiator or responder in the original IKE_SA), the use of EAP + authentication and/or configuration payloads means in practice that + reauthentication has to be initiated by the same party as the + original IKE_SA. IKEv2 base specification does not allow the + responder to request reauthentication in this case; however, this + functionality is added in [ReAuth]. + + (References: "Reauthentication in IKEv2" thread, Oct/Nov 2004.) + +5.3. SPIs When Rekeying the IKE_SA + + Section 2.18 says that "New initiator and responder SPIs are supplied + in the SPI fields". This refers to the SPI fields in the Proposal + structures inside the Security Association (SA) payloads, not the SPI + fields in the IKE header. + + (References: Tom Stiemerling's mail "Rekey IKE SA", 2005-01-24. + Geoffrey Huang's reply, 2005-01-24.) + +5.4. SPI When Rekeying a CHILD_SA + + Section 3.10.1 says that in REKEY_SA notifications, "The SPI field + identifies the SA being rekeyed." + + Since CHILD_SAs always exist in pairs, there are two different SPIs. + The SPI placed in the REKEY_SA notification is the SPI the exchange + initiator would expect in inbound ESP or AH packets (just as in + Delete payloads). + + + + + + +Eronen & Hoffman Informational [Page 25] + +RFC 4718 IKEv2 Clarifications October 2006 + + +5.5. Changing PRFs When Rekeying the IKE_SA + + When rekeying the IKE_SA, Section 2.18 says that "SKEYSEED for the + new IKE_SA is computed using SK_d from the existing IKE_SA as + follows: + + SKEYSEED = prf(SK_d (old), [g^ir (new)] | Ni | Nr)" + + If the old and new IKE_SA selected a different PRF, it is not totally + clear which PRF should be used. + + Since the rekeying exchange belongs to the old IKE_SA, it is the old + IKE_SA's PRF that is used. This also follows the principle that the + same key (the old SK_d) should not be used with multiple + cryptographic algorithms. + + Note that this may work poorly if the new IKE_SA's PRF has a fixed + key size, since the output of the PRF may not be of the correct size. + This supports our opinion earlier in the document that the use of + PRFs with a fixed key size is a bad idea. + + (References: "Changing PRFs when rekeying the IKE_SA" thread, June + 2005.) + +5.6. Deleting vs. Closing SAs + + The IKEv2 specification talks about "closing" and "deleting" SAs, but + it is not always clear what exactly is meant. However, other parts + of the specification make it clear that when local state related to a + CHILD_SA is removed, the SA must also be actively deleted with a + Delete payload. + + In particular, Section 2.4 says that "If an IKE endpoint chooses to + delete CHILD_SAs, it MUST send Delete payloads to the other end + notifying it of the deletion". Section 1.4 also explains that "ESP + and AH SAs always exist in pairs, with one SA in each direction. + When an SA is closed, both members of the pair MUST be closed." + +5.7. Deleting a CHILD_SA Pair + + Section 1.4 describes how to delete SA pairs using the Informational + exchange: "To delete an SA, an INFORMATIONAL exchange with one or + more delete payloads is sent listing the SPIs (as they would be + expected in the headers of inbound packets) of the SAs to be deleted. + The recipient MUST close the designated SAs." + + + + + + +Eronen & Hoffman Informational [Page 26] + +RFC 4718 IKEv2 Clarifications October 2006 + + + The "one or more delete payloads" phrase has caused some confusion. + You never send delete payloads for the two sides of an SA in a single + message. If you have many SAs to delete at the same time (such as + the nested example given in that paragraph), you include delete + payloads for the inbound half of each SA in your Informational + exchange. + +5.8. Deleting an IKE_SA + + Since IKE_SAs do not exist in pairs, it is not totally clear what the + response message should contain when the request deleted the IKE_SA. + + Since there is no information that needs to be sent to the other side + (except that the request was received), an empty Informational + response seems like the most logical choice. + + (References: "Question about delete IKE SA" thread, May 2005.) + +5.9. Who is the original initiator of IKE_SA + + In the IKEv2 document, "initiator" refers to the party who initiated + the exchange being described, and "original initiator" refers to the + party who initiated the whole IKE_SA. However, there is some + potential for confusion because the IKE_SA can be rekeyed by either + party. + + To clear up this confusion, we propose that "original initiator" + always refers to the party who initiated the exchange that resulted + in the current IKE_SA. In other words, if the "original responder" + starts rekeying the IKE_SA, that party becomes the "original + initiator" of the new IKE_SA. + + (References: Paul Hoffman's mail "Original initiator in IKEv2", + 2005-04-21.) + +5.10. Comparing Nonces + + Section 2.8 about rekeying says that "If redundant SAs are created + though such a collision, the SA created with the lowest of the four + nonces used in the two exchanges SHOULD be closed by the endpoint + that created it." + + + + + + + + + + +Eronen & Hoffman Informational [Page 27] + +RFC 4718 IKEv2 Clarifications October 2006 + + + Here "lowest" uses an octet-by-octet (lexicographical) comparison + (instead of, for instance, comparing the nonces as large integers). + In other words, start by comparing the first octet; if they're equal, + move to the next octet, and so on. If you reach the end of one + nonce, that nonce is the lower one. + + (References: "IKEv2 rekeying question" thread, July 2005.) + +5.11. Exchange Collisions + + Since IKEv2 exchanges can be initiated by both peers, it is possible + that two exchanges affecting the same SA partly overlap. This can + lead to a situation where the SA state information is temporarily not + synchronized, and a peer can receive a request it cannot process in a + normal fashion. Some of these corner cases are discussed in the + specification, some are not. + + Obviously, using a window size greater than one leads to infinitely + more complex situations, especially if requests are processed out of + order. In this section, we concentrate on problems that can arise + even with window size 1. + + (References: "IKEv2: invalid SPI in DELETE payload" thread, Dec 2005/ + Jan 2006. "Problem with exchanges collisions" thread, Dec 2005.) + +5.11.1. Simultaneous CHILD_SA Close + + Probably the simplest case happens if both peers decide to close the + same CHILD_SA pair at the same time: + + Host A Host B + -------- -------- + send req1: D(SPIa) --> + <-- send req2: D(SPIb) + --> recv req1 + <-- send resp1: () + recv resp1 + recv req2 + send resp2: () --> + --> recv resp2 + + This case is described in Section 1.4 and is handled by omitting the + Delete payloads from the response messages. + + + + + + + + +Eronen & Hoffman Informational [Page 28] + +RFC 4718 IKEv2 Clarifications October 2006 + + +5.11.2. Simultaneous IKE_SA Close + + Both peers can also decide to close the IKE_SA at the same time. The + desired end result is obvious; however, in certain cases the final + exchanges may not be fully completed. + + Host A Host B + -------- -------- + send req1: D() --> + <-- send req2: D() + --> recv req1 + + At this point, host B should reply as usual (with empty Informational + response), close the IKE_SA, and stop retransmitting req2. This is + because once host A receives resp1, it may not be able to reply any + longer. The situation is symmetric, so host A should behave the same + way. + + Host A Host B + -------- -------- + <-- send resp1: () + send resp2: () + + Even if neither resp1 nor resp2 ever arrives, the end result is still + correct: the IKE_SA is gone. The same happens if host A never + receives req2. + +5.11.3. Simultaneous CHILD_SA Rekeying + + Another case that is described in the specification is simultaneous + rekeying. Section 2.8 says + + "If the two ends have the same lifetime policies, it is possible + that both will initiate a rekeying at the same time (which will + result in redundant SAs). To reduce the probability of this + happening, the timing of rekeying requests SHOULD be jittered + (delayed by a random amount of time after the need for rekeying is + noticed). + + This form of rekeying may temporarily result in multiple similar + SAs between the same pairs of nodes. When there are two SAs + eligible to receive packets, a node MUST accept incoming packets + through either SA. If redundant SAs are created though such a + collision, the SA created with the lowest of the four nonces used + in the two exchanges SHOULD be closed by the endpoint that created + it." + + + + + +Eronen & Hoffman Informational [Page 29] + +RFC 4718 IKEv2 Clarifications October 2006 + + + However, a better explanation on what impact this has on + implementations is needed. Assume that hosts A and B have an + existing IPsec SA pair with SPIs (SPIa1,SPIb1), and both start + rekeying it at the same time: + + Host A Host B + -------- -------- + send req1: N(REKEY_SA,SPIa1), + SA(..,SPIa2,..),Ni1,.. --> + <-- send req2: N(REKEY_SA,SPIb1), + SA(..,SPIb2,..),Ni2,.. + recv req2 <-- + + At this point, A knows there is a simultaneous rekeying going on. + However, it cannot yet know which of the exchanges will have the + lowest nonce, so it will just note the situation and respond as + usual. + + send resp2: SA(..,SPIa3,..),Nr1,.. --> + --> recv req1 + + Now B also knows that simultaneous rekeying is going on. Similarly + as host A, it has to respond as usual. + + <-- send resp1: SA(..,SPIb3,..),Nr2,.. + recv resp1 <-- + --> recv resp2 + + At this point, there are three CHILD_SA pairs between A and B (the + old one and two new ones). A and B can now compare the nonces. + Suppose that the lowest nonce was Nr1 in message resp2; in this case, + B (the sender of req2) deletes the redundant new SA, and A (the node + that initiated the surviving rekeyed SA) deletes the old one. + + send req3: D(SPIa1) --> + <-- send req4: D(SPIb2) + --> recv req3 + <-- send resp4: D(SPIb1) + recv req4 <-- + send resp4: D(SPIa3) --> + + The rekeying is now finished. + + However, there is a second possible sequence of events that can + happen if some packets are lost in the network, resulting in + retransmissions. The rekeying begins as usual, but A's first packet + (req1) is lost. + + + + +Eronen & Hoffman Informational [Page 30] + +RFC 4718 IKEv2 Clarifications October 2006 + + + Host A Host B + -------- -------- + send req1: N(REKEY_SA,SPIa1), + SA(..,SPIa2,..),Ni1,.. --> (lost) + <-- send req2: N(REKEY_SA,SPIb1), + SA(..,SPIb2,..),Ni2,.. + recv req2 <-- + send resp2: SA(..,SPIa3,..),Nr1,.. --> + --> recv resp2 + <-- send req3: D(SPIb1) + recv req3 <-- + send resp3: D(SPIa1) --> + --> recv resp3 + + From B's point of view, the rekeying is now completed, and since it + has not yet received A's req1, it does not even know that these was + simultaneous rekeying. However, A will continue retransmitting the + message, and eventually it will reach B. + + resend req1 --> + --> recv req1 + + What should B do in this point? To B, it looks like A is trying to + rekey an SA that no longer exists; thus failing the request with + something non-fatal such as NO_PROPOSAL_CHOSEN seems like a + reasonable approach. + + <-- send resp1: N(NO_PROPOSAL_CHOSEN) + recv resp1 <-- + + When A receives this error, it already knows there was simultaneous + rekeying, so it can ignore the error message. + +5.11.4. Simultaneous IKE_SA Rekeying + + Probably the most complex case occurs when both peers try to rekey + the IKE_SA at the same time. Basically, the text in Section 2.8 + applies to this case as well; however, it is important to ensure that + the CHILD_SAs are inherited by the right IKE_SA. + + The case where both endpoints notice the simultaneous rekeying works + the same way as with CHILD_SAs. After the CREATE_CHILD_SA exchanges, + three IKE_SAs exist between A and B; the one containing the lowest + nonce inherits the CHILD_SAs. + + However, there is a twist to the other case where one rekeying + finishes first: + + + + +Eronen & Hoffman Informational [Page 31] + +RFC 4718 IKEv2 Clarifications October 2006 + + + Host A Host B + -------- -------- + send req1: + SA(..,SPIa1,..),Ni1,.. --> + <-- send req2: SA(..,SPIb1,..),Ni2,.. + --> recv req1 + <-- send resp1: SA(..,SPIb2,..),Nr2,.. + recv resp1 <-- + send req3: D() --> + --> recv req3 + + At this point, host B sees a request to close the IKE_SA. There's + not much more to do than to reply as usual. However, at this point + host B should stop retransmitting req2, since once host A receives + resp3, it will delete all the state associated with the old IKE_SA + and will not be able to reply to it. + + <-- send resp3: () + +5.11.5. Closing and Rekeying a CHILD_SA + + A case similar to simultaneous rekeying can occur if one peer decides + to close an SA and the other peer tries to rekey it: + + Host A Host B + -------- -------- + send req1: D(SPIa) --> + <-- send req2: N(REKEY_SA,SPIb),SA,.. + --> recv req1 + + At this point, host B notices that host A is trying to close an SA + that host B is currently rekeying. Replying as usual is probably the + best choice: + + <-- send resp1: D(SPIb) + + Depending on in which order req2 and resp1 arrive, host A sees either + a request to rekey an SA that it is currently closing, or a request + to rekey an SA that does not exist. In both cases, + NO_PROPOSAL_CHOSEN is probably fine. + + recv req2 + recv resp1 + send resp2: N(NO_PROPOSAL_CHOSEN) --> + --> recv resp2 + + + + + + +Eronen & Hoffman Informational [Page 32] + +RFC 4718 IKEv2 Clarifications October 2006 + + +5.11.6. Closing a New CHILD_SA + + Yet another case occurs when host A creates a CHILD_SA pair, but soon + thereafter host B decides to delete it (possible because its policy + changed): + + Host A Host B + -------- -------- + send req1: [N(REKEY_SA,SPIa1)], + SA(..,SPIa2,..),.. --> + --> recv req1 + (lost) <-- send resp1: SA(..,SPIb2,..),.. + + <-- send req2: D(SPIb2) + recv req2 + + At this point, host A has not yet received message resp1 (and is + retransmitting message req1), so it does not recognize SPIb in + message req2. What should host A do? + + One option would be to reply with an empty Informational response. + However, this same reply would also be sent if host A has received + resp1, but has already sent a new request to delete the SA that was + just created. This would lead to a situation where the peers are no + longer in sync about which SAs exist between them. However, host B + would eventually notice that the other half of the CHILD_SA pair has + not been deleted. Section 1.4 describes this case and notes that "a + node SHOULD regard half-closed connections as anomalous and audit + their existence should they persist", and continues that "if + connection state becomes sufficiently messed up, a node MAY close the + IKE_SA". + + Another solution that has been proposed is to reply with an + INVALID_SPI notification that contains SPIb. This would explicitly + tell host B that the SA was not deleted, so host B could try deleting + it again later. However, this usage is not part of the IKEv2 + specification and would not be in line with normal use of the + INVALID_SPI notification where the data field contains the SPI the + recipient of the notification would put in outbound packets. + + Yet another solution would be to ignore req2 at this time and wait + until we have received resp1. However, this alternative has not been + fully analyzed at this time; in general, ignoring valid requests is + always a bit dangerous, because both endpoints could do it, leading + to a deadlock. + + This document recommends the first alternative. + + + + +Eronen & Hoffman Informational [Page 33] + +RFC 4718 IKEv2 Clarifications October 2006 + + +5.11.7. Rekeying a New CHILD_SA + + Yet another case occurs when a CHILD_SA is rekeyed soon after it has + been created: + + Host A Host B + -------- -------- + send req1: [N(REKEY_SA,SPIa1)], + SA(..,SPIa2,..),.. --> + (lost) <-- send resp1: SA(..,SPIb2,..),.. + + <-- send req2: N(REKEY_SA,SPIb2), + SA(..,SPIb3,..),.. + recv req2 <-- + + To host A, this looks like a request to rekey an SA that does not + exist. Like in the simultaneous rekeying case, replying with + NO_PROPOSAL_CHOSEN is probably reasonable: + + send resp2: N(NO_PROPOSAL_CHOSEN) --> + recv resp1 + +5.11.8. Collisions with IKE_SA Rekeying + + Another set of cases occurs when one peer starts rekeying the IKE_SA + at the same time the other peer starts creating, rekeying, or closing + a CHILD_SA. Suppose that host B starts creating a CHILD_SA, and soon + after, host A starts rekeying the IKE_SA: + + Host A Host B + -------- -------- + <-- send req1: SA,Ni1,TSi,TSr + send req2: SA,Ni2,.. --> + --> recv req2 + + What should host B do at this point? Replying as usual would seem + like a reasonable choice: + + <-- send resp2: SA,Ni2,.. + recv resp2 <-- + send req3: D() --> + --> recv req3 + + Now, a problem arises: If host B now replies normally with an empty + Informational response, this will cause host A to delete state + associated with the IKE_SA. This means host B should stop + retransmitting req1. However, host B cannot know whether or not host + A has received req1. If host A did receive it, it will move the + + + +Eronen & Hoffman Informational [Page 34] + +RFC 4718 IKEv2 Clarifications October 2006 + + + CHILD_SA to the new IKE_SA as usual, and the state information will + then be out of sync. + + It seems this situation is tricky to handle correctly. Our proposal + is as follows: if a host receives a request to rekey the IKE_SA when + it has CHILD_SAs in "half-open" state (currently being created or + rekeyed), it should reply with NO_PROPOSAL_CHOSEN. If a host + receives a request to create or rekey a CHILD_SA after it has started + rekeying the IKE_SA, it should reply with NO_ADDITIONAL_SAS. + + The case where CHILD_SAs are being closed is even worse. Our + recommendation is that if a host receives a request to rekey the + IKE_SA when it has CHILD_SAs in "half-closed" state (currently being + closed), it should reply with NO_PROPOSAL_CHOSEN. And if a host + receives a request to close a CHILD_SA after it has started rekeying + the IKE_SA, it should reply with an empty Informational response. + This ensures that at least the other peer will eventually notice that + the CHILD_SA is still in "half-closed" state and will start a new + IKE_SA from scratch. + +5.11.9. Closing and Rekeying the IKE_SA + + The final case considered in this section occurs if one peer decides + to close the IKE_SA while the other peer tries to rekey it. + + Host A Host B + -------- -------- + send req1: SA(..,SPIa1,..),Ni1 --> + <-- send req2: D() + --> recv req1 + recv req2 <-- + + At this point, host B should probably reply with NO_PROPOSAL_CHOSEN, + and host A should reply as usual, close the IKE_SA, and stop + retransmitting req1. + + <-- send resp1: N(NO_PROPOSAL_CHOSEN) + send resp2: () + + If host A wants to continue communication with B, it can now start a + new IKE_SA. + +5.11.10. Summary + + If a host receives a request to rekey: + + o a CHILD_SA pair that the host is currently trying to close: reply + with NO_PROPOSAL_CHOSEN. + + + +Eronen & Hoffman Informational [Page 35] + +RFC 4718 IKEv2 Clarifications October 2006 + + + o a CHILD_SA pair that the host is currently rekeying: reply as + usual, but prepare to close redundant SAs later based on the + nonces. + + o a CHILD_SA pair that does not exist: reply with + NO_PROPOSAL_CHOSEN. + + o the IKE_SA, and the host is currently rekeying the IKE_SA: reply + as usual, but prepare to close redundant SAs and move inherited + CHILD_SAs later based on the nonces. + + o the IKE_SA, and the host is currently creating, rekeying, or + closing a CHILD_SA: reply with NO_PROPOSAL_CHOSEN. + + o the IKE_SA, and the host is currently trying to close the IKE_SA: + reply with NO_PROPOSAL_CHOSEN. + + If a host receives a request to close: + + o a CHILD_SA pair that the host is currently trying to close: reply + without Delete payloads. + + o a CHILD_SA pair that the host is currently rekeying: reply as + usual, with Delete payload. + + o a CHILD_SA pair that does not exist: reply without Delete + payloads. + + o the IKE_SA, and the host is currently rekeying the IKE_SA: reply + as usual, and forget about our own rekeying request. + + o the IKE_SA, and the host is currently trying to close the IKE_SA: + reply as usual, and forget about our own close request. + + If a host receives a request to create or rekey a CHILD_SA when it is + currently rekeying the IKE_SA: reply with NO_ADDITIONAL_SAS. + + If a host receives a request to delete a CHILD_SA when it is + currently rekeying the IKE_SA: reply without Delete payloads. + +5.12. Diffie-Hellman and Rekeying the IKE_SA + + There has been some confusion whether doing a new Diffie-Hellman + exchange is mandatory when the IKE_SA is rekeyed. + + It seems that this case is allowed by the IKEv2 specification. + Section 2.18 shows the Diffie-Hellman term (g^ir) in brackets. + Section 3.3.3 does not contradict this when it says that including + + + +Eronen & Hoffman Informational [Page 36] + +RFC 4718 IKEv2 Clarifications October 2006 + + + the D-H transform is mandatory: although including the transform is + mandatory, it can contain the value "NONE". + + However, having the option to skip the Diffie-Hellman exchange when + rekeying the IKE_SA does not add useful functionality to the + protocol. The main purpose of rekeying the IKE_SA is to ensure that + the compromise of old keying material does not provide information + about the current keys, or vice versa. This requires performing the + Diffie-Hellman exchange when rekeying. Furthermore, it is likely + that this option would have been removed from the protocol as + unnecessary complexity had it been discussed earlier. + + Given this, we recommend that implementations should have a hard- + coded policy that requires performing a new Diffie-Hellman exchange + when rekeying the IKE_SA. In other words, the initiator should not + propose the value "NONE" for the D-H transform, and the responder + should not accept such a proposal. This policy also implies that a + successful exchange rekeying the IKE_SA always includes the KEi/KEr + payloads. + + (References: "Rekeying IKE_SAs with the CREATE_CHILD_SA exhange" + thread, Oct 2005. "Comments of + draft-eronen-ipsec-ikev2-clarifications-02.txt" thread, Apr 2005.) + +6. Configuration Payloads + +6.1. Assigning IP Addresses + + Section 2.9 talks about traffic selector negotiation and mentions + that "In support of the scenario described in section 1.1.3, an + initiator may request that the responder assign an IP address and + tell the initiator what it is." + + This sentence is correct, but its placement is slightly confusing. + IKEv2 does allow the initiator to request assignment of an IP address + from the responder, but this is done using configuration payloads, + not traffic selector payloads. An address in a TSi payload in a + response does not mean that the responder has assigned that address + to the initiator; it only means that if packets matching these + traffic selectors are sent by the initiator, IPsec processing can be + performed as agreed for this SA. The TSi payload itself does not + give the initiator permission to configure the initiator's TCP/IP + stack with the address and use it as its source address. + + In other words, IKEv2 does not have two different mechanisms for + assigning addresses, but only one: configuration payloads. In the + scenario described in Section 1.1.3, both configuration and traffic + selector payloads are usually included in the same message, and they + + + +Eronen & Hoffman Informational [Page 37] + +RFC 4718 IKEv2 Clarifications October 2006 + + + often contain the same information in the response message (see + Section 6.3 of this document for some examples). However, their + semantics are still different. + +6.2. Requesting any INTERNAL_IP4/IP6_ADDRESS + + When describing the INTERNAL_IP4/IP6_ADDRESS attributes, Section + 3.15.1 says that "In a request message, the address specified is a + requested address (or zero if no specific address is requested)". + The question here is whether "zero" means an address "0.0.0.0" or a + zero-length string. + + Earlier, the same section also says that "If an attribute in the + CFG_REQUEST Configuration Payload is not zero-length, it is taken as + a suggestion for that attribute". Also, the table of configuration + attributes shows that the length of INTERNAL_IP4_ADDRESS is either "0 + or 4 octets", and likewise, INTERNAL_IP6_ADDRESS is either "0 or 17 + octets". + + Thus, if the client does not request a specific address, it includes + a zero-length INTERNAL_IP4/IP6_ADDRESS attribute, not an attribute + containing an all-zeroes address. The example in 2.19 is thus + incorrect, since it shows the attribute as + "INTERNAL_ADDRESS(0.0.0.0)". + + However, since the value is only a suggestion, implementations are + recommended to ignore suggestions they do not accept; or in other + words, to treat the same way a zero-length INTERNAL_IP4_ADDRESS, + "0.0.0.0", and any other addresses the implementation does not + recognize as a reasonable suggestion. + +6.3. INTERNAL_IP4_SUBNET/INTERNAL_IP6_SUBNET + + Section 3.15.1 describes the INTERNAL_IP4_SUBNET as "The protected + sub-networks that this edge-device protects. This attribute is made + up of two fields: the first is an IP address and the second is a + netmask. Multiple sub-networks MAY be requested. The responder MAY + respond with zero or more sub-network attributes." + INTERNAL_IP6_SUBNET is defined in a similar manner. + + This raises two questions: first, since this information is usually + included in the TSr payload, what functionality does this attribute + add? And second, what does this attribute mean in CFG_REQUESTs? + + For the first question, there seem to be two sensible + interpretations. Clearly TSr (in IKE_AUTH or CREATE_CHILD_SA + response) indicates which subnets are accessible through the SA that + was just created. + + + +Eronen & Hoffman Informational [Page 38] + +RFC 4718 IKEv2 Clarifications October 2006 + + + The first interpretation of the INTERNAL_IP4/6_SUBNET attributes is + that they indicate additional subnets that can be reached through + this gateway, but need a separate SA. According to this + interpretation, the INTERNAL_IP4/6_SUBNET attributes are useful + mainly when they contain addresses not included in TSr. + + The second interpretation is that the INTERNAL_IP4/6_SUBNET + attributes express the gateway's policy about what traffic should be + sent through the gateway. The client can choose whether other + traffic (covered by TSr, but not in INTERNAL_IP4/6_SUBNET) is sent + through the gateway or directly to the destination. According to + this interpretation, the attributes are useful mainly when TSr + contains addresses not included in the INTERNAL_IP4/6_SUBNET + attributes. + + It turns out that these two interpretations are not incompatible, but + rather two sides of the same principle: traffic to the addresses + listed in the INTERNAL_IP4/6_SUBNET attributes should be sent via + this gateway. If there are no existing IPsec SAs whose traffic + selectors cover the address in question, new SAs have to be created. + + A couple of examples are given below. For instance, if there are two + subnets, 192.0.1.0/26 and 192.0.2.0/24, and the client's request + contains the following: + + CP(CFG_REQUEST) = + INTERNAL_IP4_ADDRESS() + TSi = (0, 0-65535, 0.0.0.0-255.255.255.255) + TSr = (0, 0-65535, 0.0.0.0-255.255.255.255) + + Then a valid response could be the following (in which TSr and + INTERNAL_IP4_SUBNET contain the same information): + + CP(CFG_REPLY) = + INTERNAL_IP4_ADDRESS(192.0.1.234) + INTERNAL_IP4_SUBNET(192.0.1.0/255.255.255.192) + INTERNAL_IP4_SUBNET(192.0.2.0/255.255.255.0) + TSi = (0, 0-65535, 192.0.1.234-192.0.1.234) + TSr = ((0, 0-65535, 192.0.1.0-192.0.1.63), + (0, 0-65535, 192.0.2.0-192.0.2.255)) + + In these cases, the INTERNAL_IP4_SUBNET does not really carry any + useful information. Another possible reply would have been this: + + CP(CFG_REPLY) = + INTERNAL_IP4_ADDRESS(192.0.1.234) + INTERNAL_IP4_SUBNET(192.0.1.0/255.255.255.192) + INTERNAL_IP4_SUBNET(192.0.2.0/255.255.255.0) + + + +Eronen & Hoffman Informational [Page 39] + +RFC 4718 IKEv2 Clarifications October 2006 + + + TSi = (0, 0-65535, 192.0.1.234-192.0.1.234) + TSr = (0, 0-65535, 0.0.0.0-255.255.255.255) + + This would mean that the client can send all its traffic through the + gateway, but the gateway does not mind if the client sends traffic + not included by INTERNAL_IP4_SUBNET directly to the destination + (without going through the gateway). + + A different situation arises if the gateway has a policy that + requires the traffic for the two subnets to be carried in separate + SAs. Then a response like this would indicate to the client that if + it wants access to the second subnet, it needs to create a separate + SA: + + CP(CFG_REPLY) = + INTERNAL_IP4_ADDRESS(192.0.1.234) + INTERNAL_IP4_SUBNET(192.0.1.0/255.255.255.192) + INTERNAL_IP4_SUBNET(192.0.2.0/255.255.255.0) + TSi = (0, 0-65535, 192.0.1.234-192.0.1.234) + TSr = (0, 0-65535, 192.0.1.0-192.0.1.63) + + INTERNAL_IP4_SUBNET can also be useful if the client's TSr included + only part of the address space. For instance, if the client requests + the following: + + CP(CFG_REQUEST) = + INTERNAL_IP4_ADDRESS() + TSi = (0, 0-65535, 0.0.0.0-255.255.255.255) + TSr = (0, 0-65535, 192.0.2.155-192.0.2.155) + + Then the gateway's reply could be this: + + CP(CFG_REPLY) = + INTERNAL_IP4_ADDRESS(192.0.1.234) + INTERNAL_IP4_SUBNET(192.0.1.0/255.255.255.192) + INTERNAL_IP4_SUBNET(192.0.2.0/255.255.255.0) + TSi = (0, 0-65535, 192.0.1.234-192.0.1.234) + TSr = (0, 0-65535, 192.0.2.155-192.0.2.155) + + It is less clear what the attributes mean in CFG_REQUESTs, and + whether other lengths than zero make sense in this situation (but for + INTERNAL_IP6_SUBNET, zero length is not allowed at all!). This + document recommends that implementations should not include + INTERNAL_IP4_SUBNET or INTERNAL_IP6_SUBNET attributes in + CFG_REQUESTs. + + For the IPv4 case, this document recommends using only netmasks + consisting of some amount of "1" bits followed by "0" bits; for + + + +Eronen & Hoffman Informational [Page 40] + +RFC 4718 IKEv2 Clarifications October 2006 + + + instance, "255.0.255.0" would not be a valid netmask for + INTERNAL_IP4_SUBNET. + + It is also worthwhile to note that the contents of the INTERNAL_IP4/ + 6_SUBNET attributes do not imply link boundaries. For instance, a + gateway providing access to a large company intranet using addresses + from the 10.0.0.0/8 block can send a single INTERNAL_IP4_SUBNET + attribute (10.0.0.0/255.0.0.0) even if the intranet has hundreds of + routers and separate links. + + (References: Tero Kivinen's mail "Intent of couple of attributes in + Configuration Payload in IKEv2?", 2004-11-19. Srinivasa Rao + Addepalli's mail "INTERNAL_IP4_SUBNET and INTERNAL_IP6_SUBNET in + IKEv2", 2004-09-10. Yoav Nir's mail "Re: New I-D: IKEv2 + Clarifications and Implementation Guidelines", 2005-02-07. + "Clarifications open issue: INTERNAL_IP4_SUBNET/NETMASK" thread, + April 2005.) + +6.4. INTERNAL_IP4_NETMASK + + Section 3.15.1 defines the INTERNAL_IP4_NETMASK attribute and says + that "The internal network's netmask. Only one netmask is allowed in + the request and reply messages (e.g., 255.255.255.0) and it MUST be + used only with an INTERNAL_IP4_ADDRESS attribute". + + However, it is not clear what exactly this attribute means, as the + concept of "netmask" is not very well defined for point-to-point + links (unlike multi-access links, where it means "you can reach hosts + inside this netmask directly using layer 2, instead of sending + packets via a router"). Even if the operating system's TCP/IP stack + requires a netmask to be configured, for point-to-point links it + could be just set to 255.255.255.255. So, why is this information + sent in IKEv2? + + One possible interpretation would be that the host is given a whole + block of IP addresses instead of a single address. This is also what + Framed-IP-Netmask does in [RADIUS], the IPCP "subnet mask" extension + does in PPP [IPCPSubnet], and the prefix length in the IPv6 Framed- + IPv6-Prefix attribute does in [RADIUS6]. However, nothing in the + specification supports this interpretation, and discussions on the + IPsec WG mailing list have confirmed it was not intended. Section + 3.15.1 also says that multiple addresses are assigned using multiple + INTERNAL_IP4/6_ADDRESS attributes. + + Currently, this document's interpretation is the following: + INTERNAL_IP4_NETMASK in a CFG_REPLY means roughly the same thing as + INTERNAL_IP4_SUBNET containing the same information ("send traffic to + these addresses through me"), but also implies a link boundary. For + + + +Eronen & Hoffman Informational [Page 41] + +RFC 4718 IKEv2 Clarifications October 2006 + + + instance, the client could use its own address and the netmask to + calculate the broadcast address of the link. (Whether the gateway + will actually deliver broadcast packets to other VPN clients and/or + other nodes connected to this link is another matter.) + + An empty INTERNAL_IP4_NETMASK attribute can be included in a + CFG_REQUEST to request this information (although the gateway can + send the information even when not requested). However, it seems + that non-empty values for this attribute do not make sense in + CFG_REQUESTs. + + Fortunately, Section 4 clearly says that a minimal implementation + does not need to include or understand the INTERNAL_IP4_NETMASK + attribute, and thus this document recommends that implementations + should not use the INTERNAL_IP4_NETMASK attribute or assume that the + other peer supports it. + + (References: Charlie Kaufman's mail "RE: Proposed Last Call based + revisions to IKEv2", 2004-05-27. Email discussion with Tero Kivinen, + Jan 2005. Yoav Nir's mail "Re: New I-D: IKEv2 Clarifications and + Implementation Guidelines", 2005-02-07. "Clarifications open issue: + INTERNAL_IP4_SUBNET/NETMASK" thread, April 2005.) + +6.5. Configuration Payloads for IPv6 + + IKEv2 also defines configuration payloads for IPv6. However, they + are based on the corresponding IPv4 payloads and do not fully follow + the "normal IPv6 way of doing things". + + A client can be assigned an IPv6 address using the + INTERNAL_IP6_ADDRESS configuration payload. A minimal exchange could + look like this: + + CP(CFG_REQUEST) = + INTERNAL_IP6_ADDRESS() + INTERNAL_IP6_DNS() + TSi = (0, 0-65535, :: - FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF) + TSr = (0, 0-65535, :: - FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF) + + CP(CFG_REPLY) = + INTERNAL_IP6_ADDRESS(2001:DB8:0:1:2:3:4:5/64) + INTERNAL_IP6_DNS(2001:DB8:99:88:77:66:55:44) + TSi = (0, 0-65535, 2001:DB8:0:1:2:3:4:5 - 2001:DB8:0:1:2:3:4:5) + TSr = (0, 0-65535, :: - FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF) + + In particular, IPv6 stateless autoconfiguration or router + advertisement messages are not used; neither is neighbor discovery. + + + + +Eronen & Hoffman Informational [Page 42] + +RFC 4718 IKEv2 Clarifications October 2006 + + + The client can also send a non-empty INTERNAL_IP6_ADDRESS attribute + in the CFG_REQUEST to request a specific address or interface + identifier. The gateway first checks if the specified address is + acceptable, and if it is, returns that one. If the address was not + acceptable, the gateway will attempt to use the interface identifier + with some other prefix; if even that fails, the gateway will select + another interface identifier. + + The INTERNAL_IP6_ADDRESS attribute also contains a prefix length + field. When used in a CFG_REPLY, this corresponds to the + INTERNAL_IP4_NETMASK attribute in the IPv4 case (and indeed, was + called INTERNAL_IP6_NETMASK in earlier versions of the IKEv2 draft). + See the previous section for more details. + + While this approach to configuring IPv6 addresses is reasonably + simple, it has some limitations: IPsec tunnels configured using IKEv2 + are not fully-featured "interfaces" in the IPv6 addressing + architecture [IPv6Addr] sense. In particular, they do not + necessarily have link-local addresses, and this may complicate the + use of protocols that assume them, such as [MLDv2]. (Whether they + are called "interfaces" in some particular operating system is a + different issue.) + + (References: "VPN remote host configuration IPv6 ?" thread, May 2004. + "Clarifications open issue: INTERNAL_IP4_SUBNET/NETMASK" thread, + April 2005.) + +6.6. INTERNAL_IP6_NBNS + + Section 3.15.1 defines the INTERNAL_IP6_NBNS attribute for sending + the IPv6 address of NetBIOS name servers. + + However, NetBIOS is not defined for IPv6 and probably never will be. + Thus, this attribute most likely does not make much sense. + + (Pointed out by Bernard Aboba in the IP Configuration Security (ICOS) + BoF at IETF62.) + +6.7. INTERNAL_ADDRESS_EXPIRY + + Section 3.15.1 defines the INTERNAL_ADDRESS_EXPIRY attribute as + "Specifies the number of seconds that the host can use the internal + IP address. The host MUST renew the IP address before this expiry + time. Only one of these attributes MAY be present in the reply." + + Expiry times and explicit renewals are primarily useful in + environments like DHCP, where the server cannot reliably know when + + + + +Eronen & Hoffman Informational [Page 43] + +RFC 4718 IKEv2 Clarifications October 2006 + + + the client has gone away. However, in IKEv2 this is known, and the + gateway can simply free the address when the IKE_SA is deleted. + + Also, Section 4 says that supporting renewals is not mandatory. + Given that this functionality is usually not needed, we recommend + that gateways should not send the INTERNAL_ADDRESS_EXPIRY attribute. + (And since this attribute does not seem to make much sense for + CFG_REQUESTs, clients should not send it either.) + + Note that according to Section 4, clients are required to understand + INTERNAL_ADDRESS_EXPIRY if they receive it. A minimum implementation + would use the value to limit the lifetime of the IKE_SA. + + (References: Tero Kivinen's mail "Comments of + draft-eronen-ipsec-ikev2-clarifications-02.txt", 2005-04-05. + "Questions about internal address" thread, April 2005.) + +6.8. Address Assignment Failures + + If the responder encounters an error while attempting to assign an IP + address to the initiator, it responds with an + INTERNAL_ADDRESS_FAILURE notification as described in Section 3.10.1. + However, there are some more complex error cases. + + First, if the responder does not support configuration payloads at + all, it can simply ignore all configuration payloads. This type of + implementation never sends INTERNAL_ADDRESS_FAILURE notifications. + If the initiator requires the assignment of an IP address, it will + treat a response without CFG_REPLY as an error. + + A second case is where the responder does support configuration + payloads, but only for particular type of addresses (IPv4 or IPv6). + Section 4 says that "A minimal IPv4 responder implementation will + ignore the contents of the CP payload except to determine that it + includes an INTERNAL_IP4_ADDRESS attribute". If, for instance, the + initiator includes both INTERNAL_IP4_ADDRESS and INTERNAL_IP6_ADDRESS + in the CFG_REQUEST, an IPv4-only responder can thus simply ignore the + IPv6 part and process the IPv4 request as usual. + + A third case is where the initiator requests multiple addresses of a + type that the responder supports: what should happen if some (but not + all) of the requests fail? It seems that an optimistic approach + would be the best one here: if the responder is able to assign at + least one address, it replies with those; it sends + INTERNAL_ADDRESS_FAILURE only if no addresses can be assigned. + + (References: "ikev2 and internal_ivpn_address" thread, June 2005.) + + + + +Eronen & Hoffman Informational [Page 44] + +RFC 4718 IKEv2 Clarifications October 2006 + + +7. Miscellaneous Issues + +7.1. Matching ID_IPV4_ADDR and ID_IPV6_ADDR + + When using the ID_IPV4_ADDR/ID_IPV6_ADDR identity types in IDi/IDr + payloads, IKEv2 does not require this address to match anything in + the TSi/TSr payloads. For example, in a site-to-site VPN between two + security gateways, the gateways could authenticate each other as + ID_IPV4_ADDR(192.0.1.1) and ID_IPV4_ADDR(192.0.2.1), and then create + a CHILD_SA for protecting traffic between 192.0.1.55/32 (a host + behind the first security gateway) and 192.0.2.240/28 (a network + behind the second security gateway). The authenticated identities + (IDi/IDr) are linked to the authorized traffic selectors (TSi/TSr) + using "Child SA Authorization Data" in the Peer Authorization + Database (PAD). + + Furthermore, IKEv2 does not require that the addresses in + ID_IPV4_ADDR/ID_IPV6_ADDR match the address in the IP header of the + IKE packets. However, other specifications may place additional + requirements regarding this. For example, [PKI4IPsec] requires that + implementation must be capable of comparing the addresses in the + ID_IPV4_ADDR/ID_IPV6_ADDR with the addresses in the IP header of the + IKE packets, and this comparison must be enabled by default. + + (References: "Identities types IP address,FQDN/user FQDN and DN and + its usage in preshared key authentication" thread, Jan 2005. + "Matching ID_IPV4_ADDR and ID_IPV6_ADDR" thread, May 2006.) + +7.2. Relationship of IKEv2 to RFC 4301 + + The IKEv2 specification refers to [RFC4301], but it never clearly + defines the exact relationship. + + However, there are some requirements in the specification that make + it clear that IKEv2 requires [RFC4301]. In other words, an + implementation that does IPsec processing strictly according to + [RFC2401] cannot be compliant with the IKEv2 specification. + + One such example can be found in Section 2.24: "Specifically, tunnel + encapsulators and decapsulators for all tunnel-mode SAs created by + IKEv2 [...] MUST implement the tunnel encapsulation and + decapsulation processing specified in [RFC4301] to prevent discarding + of ECN congestion indications." + + Nevertheless, the changes required to existing [RFC2401] + implementations are not very large, especially since supporting many + of the new features (such as Extended Sequence Numbers) is optional. + + + + +Eronen & Hoffman Informational [Page 45] + +RFC 4718 IKEv2 Clarifications October 2006 + + +7.3. Reducing the Window Size + + In IKEv2, the window size is assumed to be a (possibly configurable) + property of a particular implementation and is not related to + congestion control (unlike the window size in TCP, for instance). + + In particular, it is not defined what the responder should do when it + receives a SET_WINDOW_SIZE notification containing a smaller value + than is currently in effect. Thus, there is currently no way to + reduce the window size of an existing IKE_SA. However, when rekeying + an IKE_SA, the new IKE_SA starts with window size 1 until it is + explicitly increased by sending a new SET_WINDOW_SIZE notification. + + (References: Tero Kivinen's mail "Comments of + draft-eronen-ipsec-ikev2-clarifications-02.txt", 2005-04-05.) + +7.4. Minimum Size of Nonces + + Section 2.10 says that "Nonces used in IKEv2 MUST be randomly chosen, + MUST be at least 128 bits in size, and MUST be at least half the key + size of the negotiated prf." + + However, the initiator chooses the nonce before the outcome of the + negotiation is known. In this case, the nonce has to be long enough + for all the PRFs being proposed. + +7.5. Initial Zero Octets on Port 4500 + + It is not clear whether a peer sending an IKE_SA_INIT request on port + 4500 should include the initial four zero octets. Section 2.23 talks + about how to upgrade to tunneling over port 4500 after message 2, but + it does not say what to do if message 1 is sent on port 4500. + + IKE MUST listen on port 4500 as well as port 500. + + [...] + + The IKE initiator MUST check these payloads if present and if + they do not match the addresses in the outer packet MUST tunnel + all future IKE and ESP packets associated with this IKE_SA over + UDP port 4500. + + To tunnel IKE packets over UDP port 4500, the IKE header has four + octets of zero prepended and the result immediately follows the + UDP header. [...] + + + + + + +Eronen & Hoffman Informational [Page 46] + +RFC 4718 IKEv2 Clarifications October 2006 + + + The very beginning of Section 2 says "... though IKE messages may + also be received on UDP port 4500 with a slightly different format + (see section 2.23)." + + That "slightly different format" is only described in discussing what + to do after changing to port 4500. However, [RFC3948] shows clearly + the format has the initial zeros even for initiators on port 4500. + Furthermore, without the initial zeros, the processing engine cannot + determine whether the packet is an IKE packet or an ESP packet. + + Thus, all packets sent on port 4500 need the four-zero prefix; + otherwise, the receiver won't know how to handle them. + +7.6. Destination Port for NAT Traversal + + Section 2.23 says that "an IPsec endpoint that discovers a NAT + between it and its correspondent MUST send all subsequent traffic to + and from port 4500". + + This sentence is misleading. The peer "outside" the NAT uses source + port 4500 for the traffic it sends, but the destination port is, of + course, taken from packets sent by the peer behind the NAT. This + port number is usually dynamically allocated by the NAT. + +7.7. SPI Values for Messages outside an IKE_SA + + The IKEv2 specification is not quite clear what SPI values should be + used in the IKE header for the small number of notifications that are + allowed to be sent outside an IKE_SA. Note that such notifications + are explicitly not Informational exchanges; Section 1.5 makes it + clear that these are one-way messages that must not be responded to. + + There are two cases when such a one-way notification can be sent: + INVALID_IKE_SPI and INVALID_SPI. + + In case of INVALID_IKE_SPI, the message sent is a response message, + and Section 2.21 says that "If a response is sent, the response MUST + be sent to the IP address and port from whence it came with the same + IKE SPIs and the Message ID copied." + + In case of INVALID_SPI, however, there are no IKE SPI values that + would be meaningful to the recipient of such a notification. Also, + the message sent is now an INFORMATIONAL request. A strict + interpretation of the specification would require the sender to + invent garbage values for the SPI fields. However, we think this was + not the intention, and using zero values is acceptable. + + (References: "INVALID_IKE_SPI" thread, June 2005.) + + + +Eronen & Hoffman Informational [Page 47] + +RFC 4718 IKEv2 Clarifications October 2006 + + +7.8. Protocol ID/SPI Fields in Notify Payloads + + Section 3.10 says that the Protocol ID field in Notify payloads "For + notifications that do not relate to an existing SA, this field MUST + be sent as zero and MUST be ignored on receipt". However, the + specification does not clearly say which notifications are related to + existing SAs and which are not. + + Since the main purpose of the Protocol ID field is to specify the + type of the SPI, our interpretation is that the Protocol ID field + should be non-zero only when the SPI field is non-empty. + + There are currently only two notifications where this is the case: + INVALID_SELECTORS and REKEY_SA. + +7.9. Which message should contain INITIAL_CONTACT + + The description of the INITIAL_CONTACT notification in Section 3.10.1 + says that "This notification asserts that this IKE_SA is the only + IKE_SA currently active between the authenticated identities". + However, neither Section 2.4 nor 3.10.1 says in which message this + payload should be placed. + + The general agreement is that INITIAL_CONTACT is best communicated in + the first IKE_AUTH request, not as a separate exchange afterwards. + + (References: "Clarifying the use of INITIAL_CONTACT in IKEv2" thread, + April 2005. "Initial Contact messages" thread, December 2004. + "IKEv2 and Initial Contact" thread, September 2004 and April 2005.) + +7.10. Alignment of Payloads + + Many IKEv2 payloads contain fields marked as "RESERVED", mostly + because IKEv1 had them, and partly because they make the pictures + easier to draw. In particular, payloads in IKEv2 are not, in + general, aligned to 4-octet boundaries. (Note that payloads were not + aligned to 4-octet boundaries in IKEv1 either.) + + (References: "IKEv2: potential 4-byte alignment problem" thread, June + 2004.) + +7.11. Key Length Transform Attribute + + Section 3.3.5 says that "The only algorithms defined in this document + that accept attributes are the AES based encryption, integrity, and + pseudo-random functions, which require a single attribute specifying + key width." + + + + +Eronen & Hoffman Informational [Page 48] + +RFC 4718 IKEv2 Clarifications October 2006 + + + This is incorrect. The AES-based integrity and pseudo-random + functions defined in [IKEv2] always use a 128-bit key. In fact, + there are currently no integrity or PRF algorithms that use the key + length attribute (and we recommend that they should not be defined in + the future either). + + For encryption algorithms, the situation is slightly more complex + since there are three different types of algorithms: + + o The key length attribute is never used with algorithms that use a + fixed length key, such as DES and IDEA. + + o The key length attribute is always included for the currently + defined AES-based algorithms (Cipher Block Chaining (CBC), Counter + (CTR) Mode, Counter with CBC-MAC (CCM), and Galois/Counter Mode + (GCM)). Omitting the key length attribute is not allowed; if the + proposal does not contain it, the proposal has to be rejected. + + o For other algorithms, the key length attribute can be included but + is not mandatory. These algorithms include, e.g., RC5, CAST, and + BLOWFISH. If the key length attribute is not included, the + default value specified in [RFC2451] is used. + +7.12. IPsec IANA Considerations + + There are currently three different IANA registry files that contain + important numbers for IPsec: ikev2-registry, isakmp-registry, and + ipsec-registry. Implementers should note that IKEv2 may use numbers + different from those of IKEv1 for a particular algorithm. + + For instance, an encryption algorithm can have up to three different + numbers: the IKEv2 "Transform Type 1" identifier in ikev2-registry, + the IKEv1 phase 1 "Encryption Algorithm" identifier in ipsec- + registry, and the IKEv1 phase 2 "IPSEC ESP Transform Identifier" + isakmp-registry. Although some algorithms have the same number in + all three registries, the registries are not identical. + + Similarly, an integrity algorithm can have at least the IKEv2 + "Transform Type 3" identifier in ikev2-registry, the IKEv1 phase 2 + "IPSEC AH Transform Identifier" in isakmp-registry, and the IKEv1 + phase 2 ESP "Authentication Algorithm Security Association Attribute" + identifier in isakmp-registry. And there is also the IKEv1 phase 1 + "Hash Algorithm" list in ipsec-registry. + + This issue needs special care also when writing a specification for + how a new algorithm is used with IPsec. + + + + + +Eronen & Hoffman Informational [Page 49] + +RFC 4718 IKEv2 Clarifications October 2006 + + +7.13. Combining ESP and AH + + The IKEv2 specification contains some misleading text about how ESP + and AH can be combined. + + IKEv2 is based on [RFC4301], which does not include "SA bundles" that + were part of [RFC2401]. While a single packet can go through IPsec + processing multiple times, each of these passes uses a separate SA, + and the passes are coordinated by the forwarding tables. In IKEv2, + each of these SAs has to be created using a separate CREATE_CHILD_SA + exchange. Thus, the text in Section 2.7 about a single proposal + containing both ESP and AH is incorrect. + + Moreover, the combination of ESP and AH (between the same endpoints) + had already become largely obsolete in 1998 when RFC 2406 was + published. Our recommendation is that IKEv2 implementations should + not support this combination, and implementers should not assume the + combination can be made to work in an interoperable manner. + + (References: "Rekeying SA bundles" thread, Oct 2005.) + +8. Implementation Mistakes + + Some implementers at the early IKEv2 bakeoffs didn't do everything + correctly. This may seem like an obvious statement, but it is + probably useful to list a few things that were clear in the document, + but that some implementers didn't do. All of these things caused + interoperability problems. + + o Some implementations continued to send traffic on a CHILD_SA after + it was rekeyed, even after receiving an DELETE payload. + + o After rekeying an IKE_SA, some implementations did not reset their + message counters to zero. One set the counter to 2, another did + not reset the counter at all. + + o Some implementations could only handle a single pair of traffic + selectors or would only process the first pair in the proposal. + + o Some implementations responded to a delete request by sending an + empty INFORMATIONAL response and then initiated their own + INFORMATIONAL exchange with the pair of SAs to delete. + + o Although this did not happen at the bakeoff, from the discussion + there, it is clear that some people had not implemented message + window sizes correctly. Some implementations might have sent + + + + + +Eronen & Hoffman Informational [Page 50] + +RFC 4718 IKEv2 Clarifications October 2006 + + + messages that did not fit into the responder's message windows, + and some implementations may not have torn down an SA if they did + not ever receive a message that they know they should have. + +9. Security Considerations + + This document does not introduce any new security considerations to + IKEv2. If anything, clarifying complex areas of the specification + can reduce the likelihood of implementation problems that may have + security implications. + +10. Acknowledgments + + This document is mainly based on conversations on the IPsec WG + mailing list. The authors would especially like to thank Bernard + Aboba, Jari Arkko, Vijay Devarapalli, William Dixon, Francis Dupont, + Alfred Hoenes, Mika Joutsenvirta, Charlie Kaufman, Stephen Kent, Tero + Kivinen, Yoav Nir, Michael Richardson, and Joel Snyder for their + contributions. + + In addition, the authors would like to thank all the participants of + the first public IKEv2 bakeoff, held in Santa Clara in February 2005, + for their questions and proposed clarifications. + +11. References + +11.1. Normative References + + [IKEv2] Kaufman, C., Ed., "Internet Key Exchange (IKEv2) + Protocol", RFC 4306, December 2005. + + [IKEv2ALG] Schiller, J., "Cryptographic Algorithms for Use in the + Internet Key Exchange Version 2 (IKEv2)", RFC 4307, + December 2005. + + [PKCS1v20] Kaliski, B. and J. Staddon, "PKCS #1: RSA Cryptography + Specifications Version 2.0", RFC 2437, October 1998. + + [PKCS1v21] Jonsson, J. and B. Kaliski, "Public-Key Cryptography + Standards (PKCS) #1: RSA Cryptography Specifications + Version 2.1", RFC 3447, February 2003. + + [RFC2401] Kent, S. and R. Atkinson, "Security Architecture for + the Internet Protocol", RFC 2401, November 1998. + + [RFC4301] Kent, S. and K. Seo, "Security Architecture for the + Internet Protocol", RFC 4301, December 2005. + + + + +Eronen & Hoffman Informational [Page 51] + +RFC 4718 IKEv2 Clarifications October 2006 + + +11.2. Informative References + + [Aura05] Aura, T., Roe, M., and A. Mohammed, "Experiences with + Host-to-Host IPsec", 13th International Workshop on + Security Protocols, Cambridge, UK, April 2005. + + [EAP] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and + H. Levkowetz, "Extensible Authentication Protocol + (EAP)", RFC 3748, June 2004. + + [HashUse] Hoffman, P., "Use of Hash Algorithms in IKE and IPsec", + Work in Progress, July 2006. + + [IPCPSubnet] Cisco Systems, Inc., "IPCP Subnet Mask Support + Enhancements", http://www.cisco.com/univercd/cc/td/ + doc/product/software/ios121/121newft/121limit/121dc/ + 121dc3/ipcp_msk.htm, January 2003. + + [IPv6Addr] Hinden, R. and S. Deering, "IP Version 6 Addressing + Architecture", RFC 4291, February 2006. + + [MIPv6] Johnson, D., Perkins, C., and J. Arkko, "Mobility + Support in IPv6", RFC 3775, June 2004. + + [MLDv2] Vida, R. and L. Costa, "Multicast Listener Discovery + Version 2 (MLDv2) for IPv6", RFC 3810, June 2004. + + [NAI] Aboba, B., Beadles, M., Arkko, J., and P. Eronen, "The + Network Access Identifier", RFC 4282, December 2005. + + [PKI4IPsec] Korver, B., "Internet PKI Profile of IKEv1/ISAKMP, + IKEv2, and PKIX", Work in Progress, April 2006. + + [RADEAP] Aboba, B. and P. Calhoun, "RADIUS (Remote + Authentication Dial In User Service) Support For + Extensible Authentication Protocol (EAP)", RFC 3579, + September 2003. + + [RADIUS] Rigney, C., Willens, S., Rubens, A., and W. Simpson, + "Remote Authentication Dial In User Service (RADIUS)", + RFC 2865, June 2000. + + [RADIUS6] Aboba, B., Zorn, G., and D. Mitton, "RADIUS and IPv6", + RFC 3162, August 2001. + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", RFC 2119, March 1997. + + + + +Eronen & Hoffman Informational [Page 52] + +RFC 4718 IKEv2 Clarifications October 2006 + + + [RFC2451] Pereira, R. and R. Adams, "The ESP CBC-Mode Cipher + Algorithms", RFC 2451, November 1998. + + [RFC2822] Resnick, P., "Internet Message Format", RFC 2822, + April 2001. + + [RFC3664] Hoffman, P., "The AES-XCBC-PRF-128 Algorithm for the + Internet Key Exchange Protocol (IKE)", RFC 3664, + January 2004. + + [RFC3948] Huttunen, A., Swander, B., Volpe, V., DiBurro, L., and + M. Stenberg, "UDP Encapsulation of IPsec ESP Packets", + RFC 3948, January 2005. + + [RFC4434] Hoffman, P., "The AES-XCBC-PRF-128 Algorithm for the + Internet Key Exchange Protocol (IKE)", RFC 4434, + February 2006. + + [RFC822] Crocker, D., "Standard for the format of ARPA Internet + text messages", RFC 822, August 1982. + + [ReAuth] Nir, Y., "Repeated Authentication in Internet Key + Exchange (IKEv2) Protocol", RFC 4478, April 2006. + + [SCVP] Freeman, T., Housley, R., Malpani, A., Cooper, D., and + T. Polk, "Simple Certificate Validation Protocol + (SCVP)", Work in Progress, June 2006. + + + + + + + + + + + + + + + + + + + + + + + + +Eronen & Hoffman Informational [Page 53] + +RFC 4718 IKEv2 Clarifications October 2006 + + +Appendix A. Exchanges and Payloads + + This appendix contains a short summary of the IKEv2 exchanges, and + what payloads can appear in which message. This appendix is purely + informative; if it disagrees with the body of this document or the + IKEv2 specification, the other text is considered correct. + + Vendor-ID (V) payloads may be included in any place in any message. + This sequence shows what are, in our opinion, the most logical places + for them. + + The specification does not say which messages can contain + N(SET_WINDOW_SIZE). It can possibly be included in any message, but + it is not yet shown below. + +A.1. IKE_SA_INIT Exchange + + request --> [N(COOKIE)], + SA, KE, Ni, + [N(NAT_DETECTION_SOURCE_IP)+, + N(NAT_DETECTION_DESTINATION_IP)], + [V+] + + normal response <-- SA, KE, Nr, + (no cookie) [N(NAT_DETECTION_SOURCE_IP), + N(NAT_DETECTION_DESTINATION_IP)], + [[N(HTTP_CERT_LOOKUP_SUPPORTED)], CERTREQ+], + [V+] + +A.2. IKE_AUTH Exchange without EAP + + request --> IDi, [CERT+], + [N(INITIAL_CONTACT)], + [[N(HTTP_CERT_LOOKUP_SUPPORTED)], CERTREQ+], + [IDr], + AUTH, + [CP(CFG_REQUEST)], + [N(IPCOMP_SUPPORTED)+], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, TSi, TSr, + [V+] + + + + + + + + +Eronen & Hoffman Informational [Page 54] + +RFC 4718 IKEv2 Clarifications October 2006 + + + response <-- IDr, [CERT+], + AUTH, + [CP(CFG_REPLY)], + [N(IPCOMP_SUPPORTED)], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, TSi, TSr, + [N(ADDITIONAL_TS_POSSIBLE)], + [V+] + +A.3. IKE_AUTH Exchange with EAP + + first request --> IDi, + [N(INITIAL_CONTACT)], + [[N(HTTP_CERT_LOOKUP_SUPPORTED)], CERTREQ+], + [IDr], + [CP(CFG_REQUEST)], + [N(IPCOMP_SUPPORTED)+], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, TSi, TSr, + [V+] + + first response <-- IDr, [CERT+], AUTH, + EAP, + [V+] + + / --> EAP + repeat 1..N times | + \ <-- EAP + + last request --> AUTH + + last response <-- AUTH, + [CP(CFG_REPLY)], + [N(IPCOMP_SUPPORTED)], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, TSi, TSr, + [N(ADDITIONAL_TS_POSSIBLE)], + [V+] + + + + + + + +Eronen & Hoffman Informational [Page 55] + +RFC 4718 IKEv2 Clarifications October 2006 + + +A.4. CREATE_CHILD_SA Exchange for Creating/Rekeying CHILD_SAs + + request --> [N(REKEY_SA)], + [N(IPCOMP_SUPPORTED)+], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, Ni, [KEi], TSi, TSr + + response <-- [N(IPCOMP_SUPPORTED)], + [N(USE_TRANSPORT_MODE)], + [N(ESP_TFC_PADDING_NOT_SUPPORTED)], + [N(NON_FIRST_FRAGMENTS_ALSO)], + SA, Nr, [KEr], TSi, TSr, + [N(ADDITIONAL_TS_POSSIBLE)] + +A.5. CREATE_CHILD_SA Exchange for Rekeying the IKE_SA + + request --> SA, Ni, [KEi] + + response <-- SA, Nr, [KEr] + +A.6. INFORMATIONAL Exchange + + request --> [N+], + [D+], + [CP(CFG_REQUEST)] + + response <-- [N+], + [D+], + [CP(CFG_REPLY)] + + + + + + + + + + + + + + + + + + + + +Eronen & Hoffman Informational [Page 56] + +RFC 4718 IKEv2 Clarifications October 2006 + + +Authors' Addresses + + Pasi Eronen + Nokia Research Center + P.O. Box 407 + FIN-00045 Nokia Group + Finland + + EMail: pasi.eronen@nokia.com + + + Paul Hoffman + VPN Consortium + 127 Segre Place + Santa Cruz, CA 95060 + USA + + EMail: paul.hoffman@vpnc.org + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Eronen & Hoffman Informational [Page 57] + +RFC 4718 IKEv2 Clarifications October 2006 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2006). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at + ietf-ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is provided by the IETF + Administrative Support Activity (IASA). + + + + + + + +Eronen & Hoffman Informational [Page 58] + diff --git a/doc/standards/rfc4739.txt b/doc/standards/rfc4739.txt new file mode 100644 index 000000000..db5cf6acf --- /dev/null +++ b/doc/standards/rfc4739.txt @@ -0,0 +1,619 @@ + + + + + + +Network Working Group P. Eronen +Request for Comments: 4739 Nokia +Category: Experimental J. Korhonen + TeliaSonera + November 2006 + + + Multiple Authentication Exchanges + in the Internet Key Exchange (IKEv2) Protocol + +Status of This Memo + + This memo defines an Experimental Protocol for the Internet + community. It does not specify an Internet standard of any kind. + Discussion and suggestions for improvement are requested. + Distribution of this memo is unlimited. + +Copyright Notice + + Copyright (C) The IETF Trust (2006). + +Abstract + + The Internet Key Exchange (IKEv2) protocol supports several + mechanisms for authenticating the parties, including signatures with + public-key certificates, shared secrets, and Extensible + Authentication Protocol (EAP) methods. Currently, each endpoint uses + only one of these mechanisms to authenticate itself. This document + specifies an extension to IKEv2 that allows the use of multiple + authentication exchanges, using either different mechanisms or the + same mechanism. This extension allows, for instance, performing + certificate-based authentication of the client host followed by an + EAP authentication of the user. When backend authentication servers + are used, they can belong to different administrative domains, such + as the network access provider and the service provider. + + + + + + + + + + + + + + + + +Eronen & Korhonen Experimental [Page 1] + +RFC 4739 Multiple Auth. Exchanges in IKEv2 November 2006 + + +Table of Contents + + 1. Introduction ....................................................3 + 1.1. Usage Scenarios ............................................4 + 1.2. Terminology ................................................5 + 2. Solution ........................................................5 + 2.1. Solution Overview ..........................................5 + 2.2. Example 1: Multiple EAP Authentications ....................6 + 2.3. Example 2: Mixed EAP and Certificate Authentications .......7 + 2.4. Example 3: Multiple Initiator Certificates .................8 + 2.5. Example 4: Multiple Responder Certificates .................8 + 3. Payload Formats .................................................9 + 3.1. MULTIPLE_AUTH_SUPPORTED Notify Payload .....................9 + 3.2. ANOTHER_AUTH_FOLLOWS Notify Payload ........................9 + 4. IANA Considerations .............................................9 + 5. Security Considerations .........................................9 + 6. Acknowledgments ................................................10 + 7. References .....................................................10 + 7.1. Normative References ......................................10 + 7.2. Informative References ....................................10 + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Eronen & Korhonen Experimental [Page 2] + +RFC 4739 Multiple Auth. Exchanges in IKEv2 November 2006 + + +1. Introduction + + IKEv2 [IKEv2] supports several mechanisms for parties involved in the + IKE_SA (IKE security association). These include signatures with + public-key certificates, shared secrets, and Extensible + Authentication Protocol (EAP) methods. + + Currently, each endpoint uses only one of these mechanisms to + authenticate itself. However, there are scenarios where making the + authorization decision in IKEv2 (whether to allow access or not) + requires using several of these methods. + + For instance, it may be necessary to authenticate both the host + (machine) requesting access, and the user currently using the host. + These two authentications would use two separate sets of credentials + (such as certificates and associated private keys) and might even use + different authentication mechanisms. + + To take another example, when an operator is hosting a Virtual + Private Network (VPN) gateway service for a third party, it may be + necessary to authenticate the client to both the operator (for + billing purposes) and the third party's Authentication, + Authorization, and Accounting (AAA) server (for authorizing access to + the third party's internal network). + + This document specifies an extension to IKEv2 that allows the use of + multiple authentication exchanges, using either different mechanisms + or the same mechanism. This extension allows, for instance, + performing certificate-based authentication of the client host + followed by an EAP authentication of the user. + + Each authentication exchange requiring communication with backend AAA + servers may be directed to different backend AAA servers, located + even in different administrative domains. However, details of the + communication between the IKEv2 gateway and the backend + authentication servers are beyond the scope of this document. In + particular, this document does not specify any changes to existing + AAA protocols, and it does not require the use of any particular AAA + protocol. + + In case of several EAP authentications, it is important to notice + that they are not a "sequence" (as described in Section 2.1 of + [EAP]), but separate independent EAP conversations, which are usually + also terminated in different EAP servers. Multiple authentication + methods within a single EAP conversation are still prohibited as + described in Section 2.1 of [EAP]. Using multiple independent EAP + conversations is similar to the separate Network Access Provider + (NAP) and Internet Service Provider (ISP) authentication exchanges + + + +Eronen & Korhonen Experimental [Page 3] + +RFC 4739 Multiple Auth. Exchanges in IKEv2 November 2006 + + + planned for [PANA]. The discovery of the appropriate EAP server for + each EAP authentication conversation is based on AAA routing. + +1.1. Usage Scenarios + + Figure 1 shows an example architecture of an operator-hosted VPN + scenario that could benefit from a two-phase authentication within + the IKEv2 exchange. First, the client authenticates towards the + Network Access Provider (NAP) and gets access to the NAP-hosted VPN + gateway. The first-phase authentication involves the backend AAA + server of the NAP. After the first authentication, the client + initiates the second authentication round that also involves the + Third Party's backend AAA server. If both authentications succeed, + the required IPsec tunnels are set up and the client can access + protected networks behind the Third Party. + + + Client *Network Access Provider* + +---------+ +---------+ +-----+ + | | | NAP's | | NAP | + |Protected| IPsec SAs | Tunnel | AAA Protocol | AAA | + |Endpoint |<------------------>|Endpoint |<------------>|Serv/| + | | | | |Proxy| + +---------+ +---------+ +-----+ + ^ ^ + IPsec or / AAA | + Leased Line / Protocol | + / | + v | + +---------+ *Third Party* v + |3rd Party| +-----+ + Protected | Tunnel | | 3rd | + Subnet <----|Endpoint | |Party| + | | | AAA | + +---------+ +-----+ + + Figure 1: Two-phase authentication used to gain access to + the Third Party network via Network Access Provider. AAA + traffic goes through NAP's AAA server. + + The NAP's AAA server can be used to proxy the AAA traffic to the + Third Party's backend AAA server. Alternatively, the AAA traffic + from the NAP's tunnel endpoint could go directly to the Third Party's + backend AAA servers. However, this is more or less an AAA routing + issue. + + + + + + +Eronen & Korhonen Experimental [Page 4] + +RFC 4739 Multiple Auth. Exchanges in IKEv2 November 2006 + + +1.2. Terminology + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in [KEYWORDS]. + + The terms and abbreviations "authenticator", "backend authentication + server", "EAP server", and "peer" in this document are to be + interpreted as described in [EAP]. + + When messages containing IKEv2 payloads are described, optional + payloads are shown in brackets (for instance, "[FOO]"), and a plus + sign indicates that a payload can be repeated one or more times (for + instance, "FOO+"). + +2. Solution + +2.1. Solution Overview + + The peers announce support for this IKEv2 extension by including a + MULTIPLE_AUTH_SUPPORTED notification in the IKE_SA_INIT response + (responder) and the first IKE_AUTH request (initiator). + + If both peers support this extension, either of them can announce + that it wishes to have a second authentication by including an + ANOTHER_AUTH_FOLLOWS notification in any IKE_AUTH message that + contains an AUTH payload. This indicates that the peer sending the + ANOTHER_AUTH_FOLLOWS wishes to authenticate another set of + credentials to the other peer. The next IKE_AUTH message sent by + this peer will contain a second identity payload (IDi or IDr) and + starts another authentication exchange. The IKE_AUTH phase is + considered successful only if all the individual authentication + exchanges complete successfully. + + It is assumed that both peers know what credentials they want to + present; there is no negotiation about, for instance, what type of + authentication is to be done. As in IKEv2, EAP-based authentication + is always requested by the initiator (by omitting the AUTH payload). + + The AUTH payloads are calculated as specified in [IKEv2] Sections + 2.15 and 2.16, where IDi' refers to the latest IDi payload sent by + the initiator, and IDr' refers to the latest IDr payload sent by the + responder. If EAP methods that do not generate shared keys are used, + it is possible that several AUTH payloads with identical contents are + sent. When such EAP methods are used, the purpose of the AUTH + payload is simply to delimit the authentication exchanges, and ensure + that the IKE_SA_INIT request/response messages were not modified. + + + + +Eronen & Korhonen Experimental [Page 5] + +RFC 4739 Multiple Auth. Exchanges in IKEv2 November 2006 + + +2.2. Example 1: Multiple EAP Authentications + + This example shows certificate-based authentication of the responder + followed by an EAP authentication exchange (messages 1-10). When the + first EAP exchange is ending (the initiator is sending its AUTH + payload), the initiator announces that it wishes to have a second + authentication exchange by including an ANOTHER_AUTH_FOLLOWS + notification (message 9). + + After this, a second authentication exchange begins. The initiator + sends a new IDi payload but no AUTH payload (message 11), indicating + that EAP will be used. After that, another EAP authentication + exchange follows (messages 12-18). + + Initiator Responder + ----------- ----------- + 1. HDR, SA, KE, Ni --> + <-- 2. HDR, SA, KE, Nr, [CERTREQ], + N(MULTIPLE_AUTH_SUPPORTED) + 3. HDR, SK { IDi, [CERTREQ+], [IDr], + SA, TSi, TSr, N(MULTIPLE_AUTH_SUPPORTED) } --> + <-- 4. HDR, SK { IDr, [CERT+], AUTH, + EAP(Request) } + 5. HDR, SK { EAP(Response) } --> + <-- 6. HDR, SK { EAP(Request) } + 7. HDR, SK { EAP(Response) } --> + <-- 8. HDR, SK { EAP(Success) } + 9. HDR, SK { AUTH, + N(ANOTHER_AUTH_FOLLOWS) } --> + <-- 10. HDR, SK { AUTH } + 11. HDR, SK { IDi } --> + <-- 12. HDR, SK { EAP(Request) } + 13. HDR, SK { EAP(Response) } --> + <-- 14. HDR, SK { EAP(Request) } + 15. HDR, SK { EAP(Response) } --> + <-- 16. HDR, SK { EAP(Success) } + 17. HDR, SK { AUTH } --> + <-- 18. HDR, SK { AUTH, SA, TSi, TSr } + + Example 1: Certificate-based authentication of the + responder, followed by two EAP authentication exchanges. + + + + + + + + + + +Eronen & Korhonen Experimental [Page 6] + +RFC 4739 Multiple Auth. Exchanges in IKEv2 November 2006 + + +2.3. Example 2: Mixed EAP and Certificate Authentications + + Another example is shown below: here both the initiator and the + responder are first authenticated using certificates (or shared + secrets); this is followed by an EAP authentication exchange. + + Initiator Responder + ----------- ----------- + 1. HDR, SA, KE, Ni --> + <-- 2. HDR, SA, KE, Nr, [CERTREQ], + N(MULTIPLE_AUTH_SUPPORTED) + 3. HDR, SK { IDi, [CERT+], [CERTREQ+], [IDr], AUTH, + SA, TSi, TSr, N(MULTIPLE_AUTH_SUPPORTED), + N(ANOTHER_AUTH_FOLLOWS) } --> + <-- 4. HDR, SK { IDr, [CERT+], AUTH } + 5. HDR, SK { IDi } --> + <-- 6. HDR, SK { EAP(Request) } + 7. HDR, SK { EAP(Response) } --> + <-- 8. HDR, SK { EAP(Request) } + 9. HDR, SK { EAP(Response) } --> + <-- 10. HDR, SK { EAP(Success) } + 11. HDR, SK { AUTH } --> + <-- 12. HDR, SK { AUTH, SA, TSi, TSr } + + Example 2: Certificate-based (or shared-secret-based) + authentication of the initiator and the responder, + followed by an EAP authentication exchange. + + + + + + + + + + + + + + + + + + + + + + + + +Eronen & Korhonen Experimental [Page 7] + +RFC 4739 Multiple Auth. Exchanges in IKEv2 November 2006 + + +2.4. Example 3: Multiple Initiator Certificates + + This example shows yet another possibility: the initiator has two + different certificates (and associated private keys), and + authenticates both of them to the responder. + + Initiator Responder + ----------- ----------- + 1. HDR, SA, KE, Ni --> + <-- 2. HDR, SA, KE, Nr, [CERTREQ], + N(MULTIPLE_AUTH_SUPPORTED) + 3. HDR, SK { IDi, [CERT+], [CERTREQ+], [IDr], AUTH, + SA, TSi, TSr, N(MULTIPLE_AUTH_SUPPORTED), + N(ANOTHER_AUTH_FOLLOWS) } --> + <-- 4. HDR, SK { IDr, [CERT+], AUTH } + 5. HDR, SK { IDi, [CERT+], AUTH } --> + <-- 6. HDR, SK { SA, TSi, TSr } + + Example 3: Two certificate-based authentications of the + initiator, and one certificate-based authentication + of the responder. + +2.5. Example 4: Multiple Responder Certificates + + This example shows yet another possibility: the responder has two + different certificates (and associated private keys), and + authenticates both of them to the initiator. + + Initiator Responder + ----------- ----------- + 1. HDR, SA, KE, Ni --> + <-- 2. HDR, SA, KE, Nr, [CERTREQ], + N(MULTIPLE_AUTH_SUPPORTED) + 3. HDR, SK { IDi, [CERT+], [CERTREQ+], [IDr], AUTH, + SA, TSi, TSr, N(MULTIPLE_AUTH_SUPPORTED) } --> + <-- 4. HDR, SK { IDr, [CERT+], AUTH, + N(ANOTHER_AUTH_FOLLOWS) } + 5. HDR, SK { } --> + <-- 6. HDR, SK { IDr, [CERT+], AUTH, + SA, TSi, TSr } + + Example 4: Two certificate-based authentications of the + responder, and one certificate-based authentication + of the initiator. + + + + + + + +Eronen & Korhonen Experimental [Page 8] + +RFC 4739 Multiple Auth. Exchanges in IKEv2 November 2006 + + +3. Payload Formats + +3.1. MULTIPLE_AUTH_SUPPORTED Notify Payload + + The MULTIPLE_AUTH_SUPPORTED notification is included in the + IKE_SA_INIT response or the first IKE_AUTH request to indicate that + the peer supports this specification. The Notify Message Type is + MULTIPLE_AUTH_SUPPORTED (16404). The Protocol ID and SPI Size fields + MUST be set to zero, and there is no data associated with this Notify + type. + +3.2. ANOTHER_AUTH_FOLLOWS Notify Payload + + The ANOTHER_AUTH_FOLLOWS notification payload is included in an + IKE_AUTH message containing an AUTH payload to indicate that the peer + wants to continue with another authentication exchange. The Notify + Message Type is ANOTHER_AUTH_FOLLOWS (16405). The Protocol ID and + SPI Size fields MUST be set to zero, and there is no data associated + with this Notify type. + +4. IANA Considerations + + This document defines two new IKEv2 notifications, + MULTIPLE_AUTH_SUPPORTED and ANOTHER_AUTH_FOLLOWS, whose values are + allocated from the "IKEv2 Notify Message Types" namespace defined in + [IKEv2]. + + This document does not define any new namespaces to be managed by + IANA. + +5. Security Considerations + + Security considerations for IKEv2 are discussed in [IKEv2]. The + reader is encouraged to pay special attention to considerations + relating to the use of EAP methods that do not generate shared keys. + However, the use of multiple authentication exchanges results in at + least one new security consideration. + + In normal IKEv2, the responder authenticates the initiator before + revealing its identity (except when EAP is used). When multiple + authentication exchanges are used to authenticate the initiator, the + responder has to reveal its identity before all of the initiator + authentication exchanges have been completed. + + + + + + + + +Eronen & Korhonen Experimental [Page 9] + +RFC 4739 Multiple Auth. Exchanges in IKEv2 November 2006 + + +6. Acknowledgments + + The authors would like to thank Bernard Aboba, Jari Arkko, Spencer + Dawkins, Lakshminath Dondeti, Henry Haverinen, Russ Housley, Mika + Joutsenvirta, Charlie Kaufman, Tero Kivinen, Yoav Nir, Magnus + Nystrom, Mohan Parthasarathy, and Juha Savolainen for their valuable + comments. + +7. References + +7.1. Normative References + + [IKEv2] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol", + RFC 4306, December 2005. + + [KEYWORDS] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", RFC 2119, March 1997. + +7.2. Informative References + + [EAP] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H. + Levkowetz, "Extensible Authentication Protocol (EAP)", + RFC 3748, June 2004. + + [PANA] Yegin, A., Ohba, Y., Penno, R., Tsirtsis, G., and C. + Wang, "Protocol for Carrying Authentication for Network + Access (PANA) Requirements", RFC 4058, May 2005. + +Authors' Addresses + + Pasi Eronen + Nokia Research Center + P.O. Box 407 + FIN-00045 Nokia Group + Finland + + EMail: pasi.eronen@nokia.com + + + Jouni Korhonen + TeliaSonera + P.O. Box 970 + FIN-00051 Sonera + Finland + + EMail: jouni.korhonen@teliasonera.com + + + + + +Eronen & Korhonen Experimental [Page 10] + +RFC 4739 Multiple Auth. Exchanges in IKEv2 November 2006 + + +Full Copyright Statement + + Copyright (C) The IETF Trust (2006). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST, + AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, + EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT + THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY + IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR + PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at + ietf-ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + +Eronen & Korhonen Experimental [Page 11] + |