|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Network Working Group C. Kaufman, Ed.
|
|
|
Request for Comments: 4306 Microsoft
|
|
|
Obsoletes: 2407, 2408, 2409 December 2005
|
|
|
Category: Standards Track
|
|
|
|
|
|
|
|
|
Internet Key Exchange (IKEv2) Protocol
|
|
|
|
|
|
Status of This Memo
|
|
|
|
|
|
This document specifies an Internet standards track protocol for the
|
|
|
Internet community, and requests discussion and suggestions for
|
|
|
improvements. Please refer to the current edition of the "Internet
|
|
|
Official Protocol Standards" (STD 1) for the standardization state
|
|
|
and status of this protocol. Distribution of this memo is unlimited.
|
|
|
|
|
|
Copyright Notice
|
|
|
|
|
|
Copyright (C) The Internet Society (2005).
|
|
|
|
|
|
Abstract
|
|
|
|
|
|
This document describes version 2 of the Internet Key Exchange (IKE)
|
|
|
protocol. IKE is a component of IPsec used for performing mutual
|
|
|
authentication and establishing and maintaining security associations
|
|
|
(SAs).
|
|
|
|
|
|
This version of the IKE specification combines the contents of what
|
|
|
were previously separate documents, including Internet Security
|
|
|
Association and Key Management Protocol (ISAKMP, RFC 2408), IKE (RFC
|
|
|
2409), the Internet Domain of Interpretation (DOI, RFC 2407), Network
|
|
|
Address Translation (NAT) Traversal, Legacy authentication, and
|
|
|
remote address acquisition.
|
|
|
|
|
|
Version 2 of IKE does not interoperate with version 1, but it has
|
|
|
enough of the header format in common that both versions can
|
|
|
unambiguously run over the same UDP port.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 1]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
Table of Contents
|
|
|
|
|
|
1. Introduction ....................................................3
|
|
|
1.1. Usage Scenarios ............................................5
|
|
|
1.2. The Initial Exchanges ......................................7
|
|
|
1.3. The CREATE_CHILD_SA Exchange ...............................9
|
|
|
1.4. The INFORMATIONAL Exchange ................................11
|
|
|
1.5. Informational Messages outside of an IKE_SA ...............12
|
|
|
2. IKE Protocol Details and Variations ............................12
|
|
|
2.1. Use of Retransmission Timers ..............................13
|
|
|
2.2. Use of Sequence Numbers for Message ID ....................14
|
|
|
2.3. Window Size for Overlapping Requests ......................14
|
|
|
2.4. State Synchronization and Connection Timeouts .............15
|
|
|
2.5. Version Numbers and Forward Compatibility .................17
|
|
|
2.6. Cookies ...................................................18
|
|
|
2.7. Cryptographic Algorithm Negotiation .......................21
|
|
|
2.8. Rekeying ..................................................22
|
|
|
2.9. Traffic Selector Negotiation ..............................24
|
|
|
2.10. Nonces ...................................................26
|
|
|
2.11. Address and Port Agility .................................26
|
|
|
2.12. Reuse of Diffie-Hellman Exponentials .....................27
|
|
|
2.13. Generating Keying Material ...............................27
|
|
|
2.14. Generating Keying Material for the IKE_SA ................28
|
|
|
2.15. Authentication of the IKE_SA .............................29
|
|
|
2.16. Extensible Authentication Protocol Methods ...............31
|
|
|
2.17. Generating Keying Material for CHILD_SAs .................33
|
|
|
2.18. Rekeying IKE_SAs Using a CREATE_CHILD_SA exchange ........34
|
|
|
2.19. Requesting an Internal Address on a Remote Network .......34
|
|
|
2.20. Requesting the Peer's Version ............................35
|
|
|
2.21. Error Handling ...........................................36
|
|
|
2.22. IPComp ...................................................37
|
|
|
2.23. NAT Traversal ............................................38
|
|
|
2.24. Explicit Congestion Notification (ECN) ...................40
|
|
|
3. Header and Payload Formats .....................................41
|
|
|
3.1. The IKE Header ............................................41
|
|
|
3.2. Generic Payload Header ....................................44
|
|
|
3.3. Security Association Payload ..............................46
|
|
|
3.4. Key Exchange Payload ......................................56
|
|
|
3.5. Identification Payloads ...................................56
|
|
|
3.6. Certificate Payload .......................................59
|
|
|
3.7. Certificate Request Payload ...............................61
|
|
|
3.8. Authentication Payload ....................................63
|
|
|
3.9. Nonce Payload .............................................64
|
|
|
3.10. Notify Payload ...........................................64
|
|
|
3.11. Delete Payload ...........................................72
|
|
|
3.12. Vendor ID Payload ........................................73
|
|
|
3.13. Traffic Selector Payload .................................74
|
|
|
3.14. Encrypted Payload ........................................77
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 2]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
3.15. Configuration Payload ....................................79
|
|
|
3.16. Extensible Authentication Protocol (EAP) Payload .........84
|
|
|
4. Conformance Requirements .......................................85
|
|
|
5. Security Considerations ........................................88
|
|
|
6. IANA Considerations ............................................90
|
|
|
7. Acknowledgements ...............................................91
|
|
|
8. References .....................................................91
|
|
|
8.1. Normative References ......................................91
|
|
|
8.2. Informative References ....................................92
|
|
|
Appendix A: Summary of Changes from IKEv1 .........................96
|
|
|
Appendix B: Diffie-Hellman Groups .................................97
|
|
|
B.1. Group 1 - 768 Bit MODP ....................................97
|
|
|
B.2. Group 2 - 1024 Bit MODP ...................................97
|
|
|
|
|
|
1. Introduction
|
|
|
|
|
|
IP Security (IPsec) provides confidentiality, data integrity, access
|
|
|
control, and data source authentication to IP datagrams. These
|
|
|
services are provided by maintaining shared state between the source
|
|
|
and the sink of an IP datagram. This state defines, among other
|
|
|
things, the specific services provided to the datagram, which
|
|
|
cryptographic algorithms will be used to provide the services, and
|
|
|
the keys used as input to the cryptographic algorithms.
|
|
|
|
|
|
Establishing this shared state in a manual fashion does not scale
|
|
|
well. Therefore, a protocol to establish this state dynamically is
|
|
|
needed. This memo describes such a protocol -- the Internet Key
|
|
|
Exchange (IKE). This is version 2 of IKE. Version 1 of IKE was
|
|
|
defined in RFCs 2407, 2408, and 2409 [Pip98, MSST98, HC98]. This
|
|
|
single document is intended to replace all three of those RFCs.
|
|
|
|
|
|
Definitions of the primitive terms in this document (such as Security
|
|
|
Association or SA) can be found in [RFC4301].
|
|
|
|
|
|
Keywords "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT" and
|
|
|
"MAY" that appear in this document are to be interpreted as described
|
|
|
in [Bra97].
|
|
|
|
|
|
The term "Expert Review" is to be interpreted as defined in
|
|
|
[RFC2434].
|
|
|
|
|
|
IKE performs mutual authentication between two parties and
|
|
|
establishes an IKE security association (SA) that includes shared
|
|
|
secret information that can be used to efficiently establish SAs for
|
|
|
Encapsulating Security Payload (ESP) [RFC4303] and/or Authentication
|
|
|
Header (AH) [RFC4302] and a set of cryptographic algorithms to be
|
|
|
used by the SAs to protect the traffic that they carry. In this
|
|
|
document, the term "suite" or "cryptographic suite" refers to a
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 3]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
complete set of algorithms used to protect an SA. An initiator
|
|
|
proposes one or more suites by listing supported algorithms that can
|
|
|
be combined into suites in a mix-and-match fashion. IKE can also
|
|
|
negotiate use of IP Compression (IPComp) [IPCOMP] in connection with
|
|
|
an ESP and/or AH SA. We call the IKE SA an "IKE_SA". The SAs for
|
|
|
ESP and/or AH that get set up through that IKE_SA we call
|
|
|
"CHILD_SAs".
|
|
|
|
|
|
All IKE communications consist of pairs of messages: a request and a
|
|
|
response. The pair is called an "exchange". We call the first
|
|
|
messages establishing an IKE_SA IKE_SA_INIT and IKE_AUTH exchanges
|
|
|
and subsequent IKE exchanges CREATE_CHILD_SA or INFORMATIONAL
|
|
|
exchanges. In the common case, there is a single IKE_SA_INIT
|
|
|
exchange and a single IKE_AUTH exchange (a total of four messages) to
|
|
|
establish the IKE_SA and the first CHILD_SA. In exceptional cases,
|
|
|
there may be more than one of each of these exchanges. In all cases,
|
|
|
all IKE_SA_INIT exchanges MUST complete before any other exchange
|
|
|
type, then all IKE_AUTH exchanges MUST complete, and following that
|
|
|
any number of CREATE_CHILD_SA and INFORMATIONAL exchanges may occur
|
|
|
in any order. In some scenarios, only a single CHILD_SA is needed
|
|
|
between the IPsec endpoints, and therefore there would be no
|
|
|
additional exchanges. Subsequent exchanges MAY be used to establish
|
|
|
additional CHILD_SAs between the same authenticated pair of endpoints
|
|
|
and to perform housekeeping functions.
|
|
|
|
|
|
IKE message flow always consists of a request followed by a response.
|
|
|
It is the responsibility of the requester to ensure reliability. If
|
|
|
the response is not received within a timeout interval, the requester
|
|
|
needs to retransmit the request (or abandon the connection).
|
|
|
|
|
|
The first request/response of an IKE session (IKE_SA_INIT) negotiates
|
|
|
security parameters for the IKE_SA, sends nonces, and sends Diffie-
|
|
|
Hellman values.
|
|
|
|
|
|
The second request/response (IKE_AUTH) transmits identities, proves
|
|
|
knowledge of the secrets corresponding to the two identities, and
|
|
|
sets up an SA for the first (and often only) AH and/or ESP CHILD_SA.
|
|
|
|
|
|
The types of subsequent exchanges are CREATE_CHILD_SA (which creates
|
|
|
a CHILD_SA) and INFORMATIONAL (which deletes an SA, reports error
|
|
|
conditions, or does other housekeeping). Every request requires a
|
|
|
response. An INFORMATIONAL request with no payloads (other than the
|
|
|
empty Encrypted payload required by the syntax) is commonly used as a
|
|
|
check for liveness. These subsequent exchanges cannot be used until
|
|
|
the initial exchanges have completed.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 4]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
In the description that follows, we assume that no errors occur.
|
|
|
Modifications to the flow should errors occur are described in
|
|
|
section 2.21.
|
|
|
|
|
|
1.1. Usage Scenarios
|
|
|
|
|
|
IKE is expected to be used to negotiate ESP and/or AH SAs in a number
|
|
|
of different scenarios, each with its own special requirements.
|
|
|
|
|
|
1.1.1. Security Gateway to Security Gateway Tunnel
|
|
|
|
|
|
+-+-+-+-+-+ +-+-+-+-+-+
|
|
|
! ! IPsec ! !
|
|
|
Protected !Tunnel ! tunnel !Tunnel ! Protected
|
|
|
Subnet <-->!Endpoint !<---------->!Endpoint !<--> Subnet
|
|
|
! ! ! !
|
|
|
+-+-+-+-+-+ +-+-+-+-+-+
|
|
|
|
|
|
Figure 1: Security Gateway to Security Gateway Tunnel
|
|
|
|
|
|
In this scenario, neither endpoint of the IP connection implements
|
|
|
IPsec, but network nodes between them protect traffic for part of the
|
|
|
way. Protection is transparent to the endpoints, and depends on
|
|
|
ordinary routing to send packets through the tunnel endpoints for
|
|
|
processing. Each endpoint would announce the set of addresses
|
|
|
"behind" it, and packets would be sent in tunnel mode where the inner
|
|
|
IP header would contain the IP addresses of the actual endpoints.
|
|
|
|
|
|
1.1.2. Endpoint-to-Endpoint Transport
|
|
|
|
|
|
+-+-+-+-+-+ +-+-+-+-+-+
|
|
|
! ! IPsec transport ! !
|
|
|
!Protected! or tunnel mode SA !Protected!
|
|
|
!Endpoint !<---------------------------------------->!Endpoint !
|
|
|
! ! ! !
|
|
|
+-+-+-+-+-+ +-+-+-+-+-+
|
|
|
|
|
|
Figure 2: Endpoint to Endpoint
|
|
|
|
|
|
In this scenario, both endpoints of the IP connection implement
|
|
|
IPsec, as required of hosts in [RFC4301]. Transport mode will
|
|
|
commonly be used with no inner IP header. If there is an inner IP
|
|
|
header, the inner addresses will be the same as the outer addresses.
|
|
|
A single pair of addresses will be negotiated for packets to be
|
|
|
protected by this SA. These endpoints MAY implement application
|
|
|
layer access controls based on the IPsec authenticated identities of
|
|
|
the participants. This scenario enables the end-to-end security that
|
|
|
has been a guiding principle for the Internet since [RFC1958],
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 5]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
[RFC2775], and a method of limiting the inherent problems with
|
|
|
complexity in networks noted by [RFC3439]. Although this scenario
|
|
|
may not be fully applicable to the IPv4 Internet, it has been
|
|
|
deployed successfully in specific scenarios within intranets using
|
|
|
IKEv1. It should be more broadly enabled during the transition to
|
|
|
IPv6 and with the adoption of IKEv2.
|
|
|
|
|
|
It is possible in this scenario that one or both of the protected
|
|
|
endpoints will be behind a network address translation (NAT) node, in
|
|
|
which case the tunneled packets will have to be UDP encapsulated so
|
|
|
that port numbers in the UDP headers can be used to identify
|
|
|
individual endpoints "behind" the NAT (see section 2.23).
|
|
|
|
|
|
1.1.3. Endpoint to Security Gateway Tunnel
|
|
|
|
|
|
+-+-+-+-+-+ +-+-+-+-+-+
|
|
|
! ! IPsec ! ! Protected
|
|
|
!Protected! tunnel !Tunnel ! Subnet
|
|
|
!Endpoint !<------------------------>!Endpoint !<--- and/or
|
|
|
! ! ! ! Internet
|
|
|
+-+-+-+-+-+ +-+-+-+-+-+
|
|
|
|
|
|
Figure 3: Endpoint to Security Gateway Tunnel
|
|
|
|
|
|
In this scenario, a protected endpoint (typically a portable roaming
|
|
|
computer) connects back to its corporate network through an IPsec-
|
|
|
protected tunnel. It might use this tunnel only to access
|
|
|
information on the corporate network, or it might tunnel all of its
|
|
|
traffic back through the corporate network in order to take advantage
|
|
|
of protection provided by a corporate firewall against Internet-based
|
|
|
attacks. In either case, the protected endpoint will want an IP
|
|
|
address associated with the security gateway so that packets returned
|
|
|
to it will go to the security gateway and be tunneled back. This IP
|
|
|
address may be static or may be dynamically allocated by the security
|
|
|
gateway. In support of the latter case, IKEv2 includes a mechanism
|
|
|
for the initiator to request an IP address owned by the security
|
|
|
gateway for use for the duration of its SA.
|
|
|
|
|
|
In this scenario, packets will use tunnel mode. On each packet from
|
|
|
the protected endpoint, the outer IP header will contain the source
|
|
|
IP address associated with its current location (i.e., the address
|
|
|
that will get traffic routed to the endpoint directly), while the
|
|
|
inner IP header will contain the source IP address assigned by the
|
|
|
security gateway (i.e., the address that will get traffic routed to
|
|
|
the security gateway for forwarding to the endpoint). The outer
|
|
|
destination address will always be that of the security gateway,
|
|
|
while the inner destination address will be the ultimate destination
|
|
|
for the packet.
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 6]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
In this scenario, it is possible that the protected endpoint will be
|
|
|
behind a NAT. In that case, the IP address as seen by the security
|
|
|
gateway will not be the same as the IP address sent by the protected
|
|
|
endpoint, and packets will have to be UDP encapsulated in order to be
|
|
|
routed properly.
|
|
|
|
|
|
1.1.4. Other Scenarios
|
|
|
|
|
|
Other scenarios are possible, as are nested combinations of the
|
|
|
above. One notable example combines aspects of 1.1.1 and 1.1.3. A
|
|
|
subnet may make all external accesses through a remote security
|
|
|
gateway using an IPsec tunnel, where the addresses on the subnet are
|
|
|
routed to the security gateway by the rest of the Internet. An
|
|
|
example would be someone's home network being virtually on the
|
|
|
Internet with static IP addresses even though connectivity is
|
|
|
provided by an ISP that assigns a single dynamically assigned IP
|
|
|
address to the user's security gateway (where the static IP addresses
|
|
|
and an IPsec relay are provided by a third party located elsewhere).
|
|
|
|
|
|
1.2. The Initial Exchanges
|
|
|
|
|
|
Communication using IKE always begins with IKE_SA_INIT and IKE_AUTH
|
|
|
exchanges (known in IKEv1 as Phase 1). These initial exchanges
|
|
|
normally consist of four messages, though in some scenarios that
|
|
|
number can grow. All communications using IKE consist of
|
|
|
request/response pairs. We'll describe the base exchange first,
|
|
|
followed by variations. The first pair of messages (IKE_SA_INIT)
|
|
|
negotiate cryptographic algorithms, exchange nonces, and do a
|
|
|
Diffie-Hellman exchange [DH].
|
|
|
|
|
|
The second pair of messages (IKE_AUTH) authenticate the previous
|
|
|
messages, exchange identities and certificates, and establish the
|
|
|
first CHILD_SA. Parts of these messages are encrypted and integrity
|
|
|
protected with keys established through the IKE_SA_INIT exchange, so
|
|
|
the identities are hidden from eavesdroppers and all fields in all
|
|
|
the messages are authenticated.
|
|
|
|
|
|
In the following descriptions, the payloads contained in the message
|
|
|
are indicated by names as listed below.
|
|
|
|
|
|
Notation Payload
|
|
|
|
|
|
AUTH Authentication
|
|
|
CERT Certificate
|
|
|
CERTREQ Certificate Request
|
|
|
CP Configuration
|
|
|
D Delete
|
|
|
E Encrypted
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 7]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
EAP Extensible Authentication
|
|
|
HDR IKE Header
|
|
|
IDi Identification - Initiator
|
|
|
IDr Identification - Responder
|
|
|
KE Key Exchange
|
|
|
Ni, Nr Nonce
|
|
|
N Notify
|
|
|
SA Security Association
|
|
|
TSi Traffic Selector - Initiator
|
|
|
TSr Traffic Selector - Responder
|
|
|
V Vendor ID
|
|
|
|
|
|
The details of the contents of each payload are described in section
|
|
|
3. Payloads that may optionally appear will be shown in brackets,
|
|
|
such as [CERTREQ], indicate that optionally a certificate request
|
|
|
payload can be included.
|
|
|
|
|
|
The initial exchanges are as follows:
|
|
|
|
|
|
Initiator Responder
|
|
|
----------- -----------
|
|
|
HDR, SAi1, KEi, Ni -->
|
|
|
|
|
|
HDR contains the Security Parameter Indexes (SPIs), version numbers,
|
|
|
and flags of various sorts. The SAi1 payload states the
|
|
|
cryptographic algorithms the initiator supports for the IKE_SA. The
|
|
|
KE payload sends the initiator's Diffie-Hellman value. Ni is the
|
|
|
initiator's nonce.
|
|
|
|
|
|
<-- HDR, SAr1, KEr, Nr, [CERTREQ]
|
|
|
|
|
|
The responder chooses a cryptographic suite from the initiator's
|
|
|
offered choices and expresses that choice in the SAr1 payload,
|
|
|
completes the Diffie-Hellman exchange with the KEr payload, and sends
|
|
|
its nonce in the Nr payload.
|
|
|
|
|
|
At this point in the negotiation, each party can generate SKEYSEED,
|
|
|
from which all keys are derived for that IKE_SA. All but the headers
|
|
|
of all the messages that follow are encrypted and integrity
|
|
|
protected. The keys used for the encryption and integrity protection
|
|
|
are derived from SKEYSEED and are known as SK_e (encryption) and SK_a
|
|
|
(authentication, a.k.a. integrity protection). A separate SK_e and
|
|
|
SK_a is computed for each direction. In addition to the keys SK_e
|
|
|
and SK_a derived from the DH value for protection of the IKE_SA,
|
|
|
another quantity SK_d is derived and used for derivation of further
|
|
|
keying material for CHILD_SAs. The notation SK { ... } indicates
|
|
|
that these payloads are encrypted and integrity protected using that
|
|
|
direction's SK_e and SK_a.
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 8]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
HDR, SK {IDi, [CERT,] [CERTREQ,] [IDr,]
|
|
|
AUTH, SAi2, TSi, TSr} -->
|
|
|
|
|
|
The initiator asserts its identity with the IDi payload, proves
|
|
|
knowledge of the secret corresponding to IDi and integrity protects
|
|
|
the contents of the first message using the AUTH payload (see section
|
|
|
2.15). It might also send its certificate(s) in CERT payload(s) and
|
|
|
a list of its trust anchors in CERTREQ payload(s). If any CERT
|
|
|
payloads are included, the first certificate provided MUST contain
|
|
|
the public key used to verify the AUTH field. The optional payload
|
|
|
IDr enables the initiator to specify which of the responder's
|
|
|
identities it wants to talk to. This is useful when the machine on
|
|
|
which the responder is running is hosting multiple identities at the
|
|
|
same IP address. The initiator begins negotiation of a CHILD_SA
|
|
|
using the SAi2 payload. The final fields (starting with SAi2) are
|
|
|
described in the description of the CREATE_CHILD_SA exchange.
|
|
|
|
|
|
<-- HDR, SK {IDr, [CERT,] AUTH,
|
|
|
SAr2, TSi, TSr}
|
|
|
|
|
|
The responder asserts its identity with the IDr payload, optionally
|
|
|
sends one or more certificates (again with the certificate containing
|
|
|
the public key used to verify AUTH listed first), authenticates its
|
|
|
identity and protects the integrity of the second message with the
|
|
|
AUTH payload, and completes negotiation of a CHILD_SA with the
|
|
|
additional fields described below in the CREATE_CHILD_SA exchange.
|
|
|
|
|
|
The recipients of messages 3 and 4 MUST verify that all signatures
|
|
|
and MACs are computed correctly and that the names in the ID payloads
|
|
|
correspond to the keys used to generate the AUTH payload.
|
|
|
|
|
|
1.3. The CREATE_CHILD_SA Exchange
|
|
|
|
|
|
This exchange consists of a single request/response pair, and was
|
|
|
referred to as a phase 2 exchange in IKEv1. It MAY be initiated by
|
|
|
either end of the IKE_SA after the initial exchanges are completed.
|
|
|
|
|
|
All messages following the initial exchange are cryptographically
|
|
|
protected using the cryptographic algorithms and keys negotiated in
|
|
|
the first two messages of the IKE exchange. These subsequent
|
|
|
messages use the syntax of the Encrypted Payload described in section
|
|
|
3.14. All subsequent messages included an Encrypted Payload, even if
|
|
|
they are referred to in the text as "empty".
|
|
|
|
|
|
Either endpoint may initiate a CREATE_CHILD_SA exchange, so in this
|
|
|
section the term "initiator" refers to the endpoint initiating this
|
|
|
exchange.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 9]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
A CHILD_SA is created by sending a CREATE_CHILD_SA request. The
|
|
|
CREATE_CHILD_SA request MAY optionally contain a KE payload for an
|
|
|
additional Diffie-Hellman exchange to enable stronger guarantees of
|
|
|
forward secrecy for the CHILD_SA. The keying material for the
|
|
|
CHILD_SA is a function of SK_d established during the establishment
|
|
|
of the IKE_SA, the nonces exchanged during the CREATE_CHILD_SA
|
|
|
exchange, and the Diffie-Hellman value (if KE payloads are included
|
|
|
in the CREATE_CHILD_SA exchange).
|
|
|
|
|
|
In the CHILD_SA created as part of the initial exchange, a second KE
|
|
|
payload and nonce MUST NOT be sent. The nonces from the initial
|
|
|
exchange are used in computing the keys for the CHILD_SA.
|
|
|
|
|
|
The CREATE_CHILD_SA request contains:
|
|
|
|
|
|
Initiator Responder
|
|
|
----------- -----------
|
|
|
HDR, SK {[N], SA, Ni, [KEi],
|
|
|
[TSi, TSr]} -->
|
|
|
|
|
|
The initiator sends SA offer(s) in the SA payload, a nonce in the Ni
|
|
|
payload, optionally a Diffie-Hellman value in the KEi payload, and
|
|
|
the proposed traffic selectors in the TSi and TSr payloads. If this
|
|
|
CREATE_CHILD_SA exchange is rekeying an existing SA other than the
|
|
|
IKE_SA, the leading N payload of type REKEY_SA MUST identify the SA
|
|
|
being rekeyed. If this CREATE_CHILD_SA exchange is not rekeying an
|
|
|
existing SA, the N payload MUST be omitted. If the SA offers include
|
|
|
different Diffie-Hellman groups, KEi MUST be an element of the group
|
|
|
the initiator expects the responder to accept. If it guesses wrong,
|
|
|
the CREATE_CHILD_SA exchange will fail, and it will have to retry
|
|
|
with a different KEi.
|
|
|
|
|
|
The message following the header is encrypted and the message
|
|
|
including the header is integrity protected using the cryptographic
|
|
|
algorithms negotiated for the IKE_SA.
|
|
|
|
|
|
The CREATE_CHILD_SA response contains:
|
|
|
|
|
|
<-- HDR, SK {SA, Nr, [KEr],
|
|
|
[TSi, TSr]}
|
|
|
|
|
|
The responder replies (using the same Message ID to respond) with the
|
|
|
accepted offer in an SA payload, and a Diffie-Hellman value in the
|
|
|
KEr payload if KEi was included in the request and the selected
|
|
|
cryptographic suite includes that group. If the responder chooses a
|
|
|
cryptographic suite with a different group, it MUST reject the
|
|
|
request. The initiator SHOULD repeat the request, but now with a KEi
|
|
|
payload from the group the responder selected.
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 10]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
The traffic selectors for traffic to be sent on that SA are specified
|
|
|
in the TS payloads, which may be a subset of what the initiator of
|
|
|
the CHILD_SA proposed. Traffic selectors are omitted if this
|
|
|
CREATE_CHILD_SA request is being used to change the key of the
|
|
|
IKE_SA.
|
|
|
|
|
|
1.4. The INFORMATIONAL Exchange
|
|
|
|
|
|
At various points during the operation of an IKE_SA, peers may desire
|
|
|
to convey control messages to each other regarding errors or
|
|
|
notifications of certain events. To accomplish this, IKE defines an
|
|
|
INFORMATIONAL exchange. INFORMATIONAL exchanges MUST ONLY occur
|
|
|
after the initial exchanges and are cryptographically protected with
|
|
|
the negotiated keys.
|
|
|
|
|
|
Control messages that pertain to an IKE_SA MUST be sent under that
|
|
|
IKE_SA. Control messages that pertain to CHILD_SAs MUST be sent
|
|
|
under the protection of the IKE_SA which generated them (or its
|
|
|
successor if the IKE_SA was replaced for the purpose of rekeying).
|
|
|
|
|
|
Messages in an INFORMATIONAL exchange contain zero or more
|
|
|
Notification, Delete, and Configuration payloads. The Recipient of
|
|
|
an INFORMATIONAL exchange request MUST send some response (else the
|
|
|
Sender will assume the message was lost in the network and will
|
|
|
retransmit it). That response MAY be a message with no payloads.
|
|
|
The request message in an INFORMATIONAL exchange MAY also contain no
|
|
|
payloads. This is the expected way an endpoint can ask the other
|
|
|
endpoint to verify that it is alive.
|
|
|
|
|
|
ESP and AH SAs always exist in pairs, with one SA in each direction.
|
|
|
When an SA is closed, both members of the pair MUST be closed. When
|
|
|
SAs are nested, as when data (and IP headers if in tunnel mode) are
|
|
|
encapsulated first with IPComp, then with ESP, and finally with AH
|
|
|
between the same pair of endpoints, all of the SAs MUST be deleted
|
|
|
together. Each endpoint MUST close its incoming SAs and allow the
|
|
|
other endpoint to close the other SA in each pair. To delete an SA,
|
|
|
an INFORMATIONAL exchange with one or more delete payloads is sent
|
|
|
listing the SPIs (as they would be expected in the headers of inbound
|
|
|
packets) of the SAs to be deleted. The recipient MUST close the
|
|
|
designated SAs. Normally, the reply in the INFORMATIONAL exchange
|
|
|
will contain delete payloads for the paired SAs going in the other
|
|
|
direction. There is one exception. If by chance both ends of a set
|
|
|
of SAs independently decide to close them, each may send a delete
|
|
|
payload and the two requests may cross in the network. If a node
|
|
|
receives a delete request for SAs for which it has already issued a
|
|
|
delete request, it MUST delete the outgoing SAs while processing the
|
|
|
request and the incoming SAs while processing the response. In that
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 11]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
case, the responses MUST NOT include delete payloads for the deleted
|
|
|
SAs, since that would result in duplicate deletion and could in
|
|
|
theory delete the wrong SA.
|
|
|
|
|
|
A node SHOULD regard half-closed connections as anomalous and audit
|
|
|
their existence should they persist. Note that this specification
|
|
|
nowhere specifies time periods, so it is up to individual endpoints
|
|
|
to decide how long to wait. A node MAY refuse to accept incoming
|
|
|
data on half-closed connections but MUST NOT unilaterally close them
|
|
|
and reuse the SPIs. If connection state becomes sufficiently messed
|
|
|
up, a node MAY close the IKE_SA; doing so will implicitly close all
|
|
|
SAs negotiated under it. It can then rebuild the SAs it needs on a
|
|
|
clean base under a new IKE_SA.
|
|
|
|
|
|
The INFORMATIONAL exchange is defined as:
|
|
|
|
|
|
Initiator Responder
|
|
|
----------- -----------
|
|
|
HDR, SK {[N,] [D,] [CP,] ...} -->
|
|
|
<-- HDR, SK {[N,] [D,] [CP], ...}
|
|
|
|
|
|
The processing of an INFORMATIONAL exchange is determined by its
|
|
|
component payloads.
|
|
|
|
|
|
1.5. Informational Messages outside of an IKE_SA
|
|
|
|
|
|
If an encrypted IKE packet arrives on port 500 or 4500 with an
|
|
|
unrecognized SPI, it could be because the receiving node has recently
|
|
|
crashed and lost state or because of some other system malfunction or
|
|
|
attack. If the receiving node has an active IKE_SA to the IP address
|
|
|
from whence the packet came, it MAY send a notification of the
|
|
|
wayward packet over that IKE_SA in an INFORMATIONAL exchange. If it
|
|
|
does not have such an IKE_SA, it MAY send an Informational message
|
|
|
without cryptographic protection to the source IP address. Such a
|
|
|
message is not part of an informational exchange, and the receiving
|
|
|
node MUST NOT respond to it. Doing so could cause a message loop.
|
|
|
|
|
|
2. IKE Protocol Details and Variations
|
|
|
|
|
|
IKE normally listens and sends on UDP port 500, though IKE messages
|
|
|
may also be received on UDP port 4500 with a slightly different
|
|
|
format (see section 2.23). Since UDP is a datagram (unreliable)
|
|
|
protocol, IKE includes in its definition recovery from transmission
|
|
|
errors, including packet loss, packet replay, and packet forgery.
|
|
|
IKE is designed to function so long as (1) at least one of a series
|
|
|
of retransmitted packets reaches its destination before timing out;
|
|
|
and (2) the channel is not so full of forged and replayed packets so
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 12]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
as to exhaust the network or CPU capacities of either endpoint. Even
|
|
|
in the absence of those minimum performance requirements, IKE is
|
|
|
designed to fail cleanly (as though the network were broken).
|
|
|
|
|
|
Although IKEv2 messages are intended to be short, they contain
|
|
|
structures with no hard upper bound on size (in particular, X.509
|
|
|
certificates), and IKEv2 itself does not have a mechanism for
|
|
|
fragmenting large messages. IP defines a mechanism for fragmentation
|
|
|
of oversize UDP messages, but implementations vary in the maximum
|
|
|
message size supported. Furthermore, use of IP fragmentation opens
|
|
|
an implementation to denial of service attacks [KPS03]. Finally,
|
|
|
some NAT and/or firewall implementations may block IP fragments.
|
|
|
|
|
|
All IKEv2 implementations MUST be able to send, receive, and process
|
|
|
IKE messages that are up to 1280 bytes long, and they SHOULD be able
|
|
|
to send, receive, and process messages that are up to 3000 bytes
|
|
|
long. IKEv2 implementations SHOULD be aware of the maximum UDP
|
|
|
message size supported and MAY shorten messages by leaving out some
|
|
|
certificates or cryptographic suite proposals if that will keep
|
|
|
messages below the maximum. Use of the "Hash and URL" formats rather
|
|
|
than including certificates in exchanges where possible can avoid
|
|
|
most problems. Implementations and configuration should keep in
|
|
|
mind, however, that if the URL lookups are possible only after the
|
|
|
IPsec SA is established, recursion issues could prevent this
|
|
|
technique from working.
|
|
|
|
|
|
2.1. Use of Retransmission Timers
|
|
|
|
|
|
All messages in IKE exist in pairs: a request and a response. The
|
|
|
setup of an IKE_SA normally consists of two request/response pairs.
|
|
|
Once the IKE_SA is set up, either end of the security association may
|
|
|
initiate requests at any time, and there can be many requests and
|
|
|
responses "in flight" at any given moment. But each message is
|
|
|
labeled as either a request or a response, and for each
|
|
|
request/response pair one end of the security association is the
|
|
|
initiator and the other is the responder.
|
|
|
|
|
|
For every pair of IKE messages, the initiator is responsible for
|
|
|
retransmission in the event of a timeout. The responder MUST never
|
|
|
retransmit a response unless it receives a retransmission of the
|
|
|
request. In that event, the responder MUST ignore the retransmitted
|
|
|
request except insofar as it triggers a retransmission of the
|
|
|
response. The initiator MUST remember each request until it receives
|
|
|
the corresponding response. The responder MUST remember each
|
|
|
response until it receives a request whose sequence number is larger
|
|
|
than the sequence number in the response plus its window size (see
|
|
|
section 2.3).
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 13]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
IKE is a reliable protocol, in the sense that the initiator MUST
|
|
|
retransmit a request until either it receives a corresponding reply
|
|
|
OR it deems the IKE security association to have failed and it
|
|
|
discards all state associated with the IKE_SA and any CHILD_SAs
|
|
|
negotiated using that IKE_SA.
|
|
|
|
|
|
2.2. Use of Sequence Numbers for Message ID
|
|
|
|
|
|
Every IKE message contains a Message ID as part of its fixed header.
|
|
|
This Message ID is used to match up requests and responses, and to
|
|
|
identify retransmissions of messages.
|
|
|
|
|
|
The Message ID is a 32-bit quantity, which is zero for the first IKE
|
|
|
request in each direction. The IKE_SA initial setup messages will
|
|
|
always be numbered 0 and 1. Each endpoint in the IKE Security
|
|
|
Association maintains two "current" Message IDs: the next one to be
|
|
|
used for a request it initiates and the next one it expects to see in
|
|
|
a request from the other end. These counters increment as requests
|
|
|
are generated and received. Responses always contain the same
|
|
|
message ID as the corresponding request. That means that after the
|
|
|
initial exchange, each integer n may appear as the message ID in four
|
|
|
distinct messages: the nth request from the original IKE initiator,
|
|
|
the corresponding response, the nth request from the original IKE
|
|
|
responder, and the corresponding response. If the two ends make very
|
|
|
different numbers of requests, the Message IDs in the two directions
|
|
|
can be very different. There is no ambiguity in the messages,
|
|
|
however, because the (I)nitiator and (R)esponse bits in the message
|
|
|
header specify which of the four messages a particular one is.
|
|
|
|
|
|
Note that Message IDs are cryptographically protected and provide
|
|
|
protection against message replays. In the unlikely event that
|
|
|
Message IDs grow too large to fit in 32 bits, the IKE_SA MUST be
|
|
|
closed. Rekeying an IKE_SA resets the sequence numbers.
|
|
|
|
|
|
2.3. Window Size for Overlapping Requests
|
|
|
|
|
|
In order to maximize IKE throughput, an IKE endpoint MAY issue
|
|
|
multiple requests before getting a response to any of them if the
|
|
|
other endpoint has indicated its ability to handle such requests.
|
|
|
For simplicity, an IKE implementation MAY choose to process requests
|
|
|
strictly in order and/or wait for a response to one request before
|
|
|
issuing another. Certain rules must be followed to ensure
|
|
|
interoperability between implementations using different strategies.
|
|
|
|
|
|
After an IKE_SA is set up, either end can initiate one or more
|
|
|
requests. These requests may pass one another over the network. An
|
|
|
IKE endpoint MUST be prepared to accept and process a request while
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 14]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
it has a request outstanding in order to avoid a deadlock in this
|
|
|
situation. An IKE endpoint SHOULD be prepared to accept and process
|
|
|
multiple requests while it has a request outstanding.
|
|
|
|
|
|
An IKE endpoint MUST wait for a response to each of its messages
|
|
|
before sending a subsequent message unless it has received a
|
|
|
SET_WINDOW_SIZE Notify message from its peer informing it that the
|
|
|
peer is prepared to maintain state for multiple outstanding messages
|
|
|
in order to allow greater throughput.
|
|
|
|
|
|
An IKE endpoint MUST NOT exceed the peer's stated window size for
|
|
|
transmitted IKE requests. In other words, if the responder stated
|
|
|
its window size is N, then when the initiator needs to make a request
|
|
|
X, it MUST wait until it has received responses to all requests up
|
|
|
through request X-N. An IKE endpoint MUST keep a copy of (or be able
|
|
|
to regenerate exactly) each request it has sent until it receives the
|
|
|
corresponding response. An IKE endpoint MUST keep a copy of (or be
|
|
|
able to regenerate exactly) the number of previous responses equal to
|
|
|
its declared window size in case its response was lost and the
|
|
|
initiator requests its retransmission by retransmitting the request.
|
|
|
|
|
|
An IKE endpoint supporting a window size greater than one SHOULD be
|
|
|
capable of processing incoming requests out of order to maximize
|
|
|
performance in the event of network failures or packet reordering.
|
|
|
|
|
|
2.4. State Synchronization and Connection Timeouts
|
|
|
|
|
|
An IKE endpoint is allowed to forget all of its state associated with
|
|
|
an IKE_SA and the collection of corresponding CHILD_SAs at any time.
|
|
|
This is the anticipated behavior in the event of an endpoint crash
|
|
|
and restart. It is important when an endpoint either fails or
|
|
|
reinitializes its state that the other endpoint detect those
|
|
|
conditions and not continue to waste network bandwidth by sending
|
|
|
packets over discarded SAs and having them fall into a black hole.
|
|
|
|
|
|
Since IKE is designed to operate in spite of Denial of Service (DoS)
|
|
|
attacks from the network, an endpoint MUST NOT conclude that the
|
|
|
other endpoint has failed based on any routing information (e.g.,
|
|
|
ICMP messages) or IKE messages that arrive without cryptographic
|
|
|
protection (e.g., Notify messages complaining about unknown SPIs).
|
|
|
An endpoint MUST conclude that the other endpoint has failed only
|
|
|
when repeated attempts to contact it have gone unanswered for a
|
|
|
timeout period or when a cryptographically protected INITIAL_CONTACT
|
|
|
notification is received on a different IKE_SA to the same
|
|
|
authenticated identity. An endpoint SHOULD suspect that the other
|
|
|
endpoint has failed based on routing information and initiate a
|
|
|
request to see whether the other endpoint is alive. To check whether
|
|
|
the other side is alive, IKE specifies an empty INFORMATIONAL message
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 15]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
that (like all IKE requests) requires an acknowledgement (note that
|
|
|
within the context of an IKE_SA, an "empty" message consists of an
|
|
|
IKE header followed by an Encrypted payload that contains no
|
|
|
payloads). If a cryptographically protected message has been
|
|
|
received from the other side recently, unprotected notifications MAY
|
|
|
be ignored. Implementations MUST limit the rate at which they take
|
|
|
actions based on unprotected messages.
|
|
|
|
|
|
Numbers of retries and lengths of timeouts are not covered in this
|
|
|
specification because they do not affect interoperability. It is
|
|
|
suggested that messages be retransmitted at least a dozen times over
|
|
|
a period of at least several minutes before giving up on an SA, but
|
|
|
different environments may require different rules. To be a good
|
|
|
network citizen, retranmission times MUST increase exponentially to
|
|
|
avoid flooding the network and making an existing congestion
|
|
|
situation worse. If there has only been outgoing traffic on all of
|
|
|
the SAs associated with an IKE_SA, it is essential to confirm
|
|
|
liveness of the other endpoint to avoid black holes. If no
|
|
|
cryptographically protected messages have been received on an IKE_SA
|
|
|
or any of its CHILD_SAs recently, the system needs to perform a
|
|
|
liveness check in order to prevent sending messages to a dead peer.
|
|
|
Receipt of a fresh cryptographically protected message on an IKE_SA
|
|
|
or any of its CHILD_SAs ensures liveness of the IKE_SA and all of its
|
|
|
CHILD_SAs. Note that this places requirements on the failure modes
|
|
|
of an IKE endpoint. An implementation MUST NOT continue sending on
|
|
|
any SA if some failure prevents it from receiving on all of the
|
|
|
associated SAs. If CHILD_SAs can fail independently from one another
|
|
|
without the associated IKE_SA being able to send a delete message,
|
|
|
then they MUST be negotiated by separate IKE_SAs.
|
|
|
|
|
|
There is a Denial of Service attack on the initiator of an IKE_SA
|
|
|
that can be avoided if the initiator takes the proper care. Since
|
|
|
the first two messages of an SA setup are not cryptographically
|
|
|
protected, an attacker could respond to the initiator's message
|
|
|
before the genuine responder and poison the connection setup attempt.
|
|
|
To prevent this, the initiator MAY be willing to accept multiple
|
|
|
responses to its first message, treat each as potentially legitimate,
|
|
|
respond to it, and then discard all the invalid half-open connections
|
|
|
when it receives a valid cryptographically protected response to any
|
|
|
one of its requests. Once a cryptographically valid response is
|
|
|
received, all subsequent responses should be ignored whether or not
|
|
|
they are cryptographically valid.
|
|
|
|
|
|
Note that with these rules, there is no reason to negotiate and agree
|
|
|
upon an SA lifetime. If IKE presumes the partner is dead, based on
|
|
|
repeated lack of acknowledgement to an IKE message, then the IKE SA
|
|
|
and all CHILD_SAs set up through that IKE_SA are deleted.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 16]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
An IKE endpoint may at any time delete inactive CHILD_SAs to recover
|
|
|
resources used to hold their state. If an IKE endpoint chooses to
|
|
|
delete CHILD_SAs, it MUST send Delete payloads to the other end
|
|
|
notifying it of the deletion. It MAY similarly time out the IKE_SA.
|
|
|
Closing the IKE_SA implicitly closes all associated CHILD_SAs. In
|
|
|
this case, an IKE endpoint SHOULD send a Delete payload indicating
|
|
|
that it has closed the IKE_SA.
|
|
|
|
|
|
2.5. Version Numbers and Forward Compatibility
|
|
|
|
|
|
This document describes version 2.0 of IKE, meaning the major version
|
|
|
number is 2 and the minor version number is zero. It is likely that
|
|
|
some implementations will want to support both version 1.0 and
|
|
|
version 2.0, and in the future, other versions.
|
|
|
|
|
|
The major version number should be incremented only if the packet
|
|
|
formats or required actions have changed so dramatically that an
|
|
|
older version node would not be able to interoperate with a newer
|
|
|
version node if it simply ignored the fields it did not understand
|
|
|
and took the actions specified in the older specification. The minor
|
|
|
version number indicates new capabilities, and MUST be ignored by a
|
|
|
node with a smaller minor version number, but used for informational
|
|
|
purposes by the node with the larger minor version number. For
|
|
|
example, it might indicate the ability to process a newly defined
|
|
|
notification message. The node with the larger minor version number
|
|
|
would simply note that its correspondent would not be able to
|
|
|
understand that message and therefore would not send it.
|
|
|
|
|
|
If an endpoint receives a message with a higher major version number,
|
|
|
it MUST drop the message and SHOULD send an unauthenticated
|
|
|
notification message containing the highest version number it
|
|
|
supports. If an endpoint supports major version n, and major version
|
|
|
m, it MUST support all versions between n and m. If it receives a
|
|
|
message with a major version that it supports, it MUST respond with
|
|
|
that version number. In order to prevent two nodes from being
|
|
|
tricked into corresponding with a lower major version number than the
|
|
|
maximum that they both support, IKE has a flag that indicates that
|
|
|
the node is capable of speaking a higher major version number.
|
|
|
|
|
|
Thus, the major version number in the IKE header indicates the
|
|
|
version number of the message, not the highest version number that
|
|
|
the transmitter supports. If the initiator is capable of speaking
|
|
|
versions n, n+1, and n+2, and the responder is capable of speaking
|
|
|
versions n and n+1, then they will negotiate speaking n+1, where the
|
|
|
initiator will set the flag indicating its ability to speak a higher
|
|
|
version. If they mistakenly (perhaps through an active attacker
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 17]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
sending error messages) negotiate to version n, then both will notice
|
|
|
that the other side can support a higher version number, and they
|
|
|
MUST break the connection and reconnect using version n+1.
|
|
|
|
|
|
Note that IKEv1 does not follow these rules, because there is no way
|
|
|
in v1 of noting that you are capable of speaking a higher version
|
|
|
number. So an active attacker can trick two v2-capable nodes into
|
|
|
speaking v1. When a v2-capable node negotiates down to v1, it SHOULD
|
|
|
note that fact in its logs.
|
|
|
|
|
|
Also for forward compatibility, all fields marked RESERVED MUST be
|
|
|
set to zero by a version 2.0 implementation and their content MUST be
|
|
|
ignored by a version 2.0 implementation ("Be conservative in what you
|
|
|
send and liberal in what you receive"). In this way, future versions
|
|
|
of the protocol can use those fields in a way that is guaranteed to
|
|
|
be ignored by implementations that do not understand them.
|
|
|
Similarly, payload types that are not defined are reserved for future
|
|
|
use; implementations of version 2.0 MUST skip over those payloads and
|
|
|
ignore their contents.
|
|
|
|
|
|
IKEv2 adds a "critical" flag to each payload header for further
|
|
|
flexibility for forward compatibility. If the critical flag is set
|
|
|
and the payload type is unrecognized, the message MUST be rejected
|
|
|
and the response to the IKE request containing that payload MUST
|
|
|
include a Notify payload UNSUPPORTED_CRITICAL_PAYLOAD, indicating an
|
|
|
unsupported critical payload was included. If the critical flag is
|
|
|
not set and the payload type is unsupported, that payload MUST be
|
|
|
ignored.
|
|
|
|
|
|
Although new payload types may be added in the future and may appear
|
|
|
interleaved with the fields defined in this specification,
|
|
|
implementations MUST send the payloads defined in this specification
|
|
|
in the order shown in the figures in section 2 and implementations
|
|
|
SHOULD reject as invalid a message with those payloads in any other
|
|
|
order.
|
|
|
|
|
|
2.6. Cookies
|
|
|
|
|
|
The term "cookies" originates with Karn and Simpson [RFC2522] in
|
|
|
Photuris, an early proposal for key management with IPsec, and it has
|
|
|
persisted. The Internet Security Association and Key Management
|
|
|
Protocol (ISAKMP) [MSST98] fixed message header includes two eight-
|
|
|
octet fields titled "cookies", and that syntax is used by both IKEv1
|
|
|
and IKEv2 though in IKEv2 they are referred to as the IKE SPI and
|
|
|
there is a new separate field in a Notify payload holding the cookie.
|
|
|
The initial two eight-octet fields in the header are used as a
|
|
|
connection identifier at the beginning of IKE packets. Each endpoint
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 18]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
chooses one of the two SPIs and SHOULD choose them so as to be unique
|
|
|
identifiers of an IKE_SA. An SPI value of zero is special and
|
|
|
indicates that the remote SPI value is not yet known by the sender.
|
|
|
|
|
|
Unlike ESP and AH where only the recipient's SPI appears in the
|
|
|
header of a message, in IKE the sender's SPI is also sent in every
|
|
|
message. Since the SPI chosen by the original initiator of the
|
|
|
IKE_SA is always sent first, an endpoint with multiple IKE_SAs open
|
|
|
that wants to find the appropriate IKE_SA using the SPI it assigned
|
|
|
must look at the I(nitiator) Flag bit in the header to determine
|
|
|
whether it assigned the first or the second eight octets.
|
|
|
|
|
|
In the first message of an initial IKE exchange, the initiator will
|
|
|
not know the responder's SPI value and will therefore set that field
|
|
|
to zero.
|
|
|
|
|
|
An expected attack against IKE is state and CPU exhaustion, where the
|
|
|
target is flooded with session initiation requests from forged IP
|
|
|
addresses. This attack can be made less effective if an
|
|
|
implementation of a responder uses minimal CPU and commits no state
|
|
|
to an SA until it knows the initiator can receive packets at the
|
|
|
address from which it claims to be sending them. To accomplish this,
|
|
|
a responder SHOULD -- when it detects a large number of half-open
|
|
|
IKE_SAs -- reject initial IKE messages unless they contain a Notify
|
|
|
payload of type COOKIE. It SHOULD instead send an unprotected IKE
|
|
|
message as a response and include COOKIE Notify payload with the
|
|
|
cookie data to be returned. Initiators who receive such responses
|
|
|
MUST retry the IKE_SA_INIT with a Notify payload of type COOKIE
|
|
|
containing the responder supplied cookie data as the first payload
|
|
|
and all other payloads unchanged. The initial exchange will then be
|
|
|
as follows:
|
|
|
|
|
|
Initiator Responder
|
|
|
----------- -----------
|
|
|
HDR(A,0), SAi1, KEi, Ni -->
|
|
|
|
|
|
<-- HDR(A,0), N(COOKIE)
|
|
|
|
|
|
HDR(A,0), N(COOKIE), SAi1, KEi, Ni -->
|
|
|
|
|
|
<-- HDR(A,B), SAr1, KEr, Nr, [CERTREQ]
|
|
|
|
|
|
HDR(A,B), SK {IDi, [CERT,] [CERTREQ,] [IDr,]
|
|
|
AUTH, SAi2, TSi, TSr} -->
|
|
|
|
|
|
<-- HDR(A,B), SK {IDr, [CERT,] AUTH,
|
|
|
SAr2, TSi, TSr}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 19]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
The first two messages do not affect any initiator or responder state
|
|
|
except for communicating the cookie. In particular, the message
|
|
|
sequence numbers in the first four messages will all be zero and the
|
|
|
message sequence numbers in the last two messages will be one. 'A' is
|
|
|
the SPI assigned by the initiator, while 'B' is the SPI assigned by
|
|
|
the responder.
|
|
|
|
|
|
An IKE implementation SHOULD implement its responder cookie
|
|
|
generation in such a way as to not require any saved state to
|
|
|
recognize its valid cookie when the second IKE_SA_INIT message
|
|
|
arrives. The exact algorithms and syntax they use to generate
|
|
|
cookies do not affect interoperability and hence are not specified
|
|
|
here. The following is an example of how an endpoint could use
|
|
|
cookies to implement limited DOS protection.
|
|
|
|
|
|
A good way to do this is to set the responder cookie to be:
|
|
|
|
|
|
Cookie = <VersionIDofSecret> | Hash(Ni | IPi | SPIi | <secret>)
|
|
|
|
|
|
where <secret> is a randomly generated secret known only to the
|
|
|
responder and periodically changed and | indicates concatenation.
|
|
|
<VersionIDofSecret> should be changed whenever <secret> is
|
|
|
regenerated. The cookie can be recomputed when the IKE_SA_INIT
|
|
|
arrives the second time and compared to the cookie in the received
|
|
|
message. If it matches, the responder knows that the cookie was
|
|
|
generated since the last change to <secret> and that IPi must be the
|
|
|
same as the source address it saw the first time. Incorporating SPIi
|
|
|
into the calculation ensures that if multiple IKE_SAs are being set
|
|
|
up in parallel they will all get different cookies (assuming the
|
|
|
initiator chooses unique SPIi's). Incorporating Ni into the hash
|
|
|
ensures that an attacker who sees only message 2 can't successfully
|
|
|
forge a message 3.
|
|
|
|
|
|
If a new value for <secret> is chosen while there are connections in
|
|
|
the process of being initialized, an IKE_SA_INIT might be returned
|
|
|
with other than the current <VersionIDofSecret>. The responder in
|
|
|
that case MAY reject the message by sending another response with a
|
|
|
new cookie or it MAY keep the old value of <secret> around for a
|
|
|
short time and accept cookies computed from either one. The
|
|
|
responder SHOULD NOT accept cookies indefinitely after <secret> is
|
|
|
changed, since that would defeat part of the denial of service
|
|
|
protection. The responder SHOULD change the value of <secret>
|
|
|
frequently, especially if under attack.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 20]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
2.7. Cryptographic Algorithm Negotiation
|
|
|
|
|
|
The payload type known as "SA" indicates a proposal for a set of
|
|
|
choices of IPsec protocols (IKE, ESP, and/or AH) for the SA as well
|
|
|
as cryptographic algorithms associated with each protocol.
|
|
|
|
|
|
An SA payload consists of one or more proposals. Each proposal
|
|
|
includes one or more protocols (usually one). Each protocol contains
|
|
|
one or more transforms -- each specifying a cryptographic algorithm.
|
|
|
Each transform contains zero or more attributes (attributes are
|
|
|
needed only if the transform identifier does not completely specify
|
|
|
the cryptographic algorithm).
|
|
|
|
|
|
This hierarchical structure was designed to efficiently encode
|
|
|
proposals for cryptographic suites when the number of supported
|
|
|
suites is large because multiple values are acceptable for multiple
|
|
|
transforms. The responder MUST choose a single suite, which MAY be
|
|
|
any subset of the SA proposal following the rules below:
|
|
|
|
|
|
Each proposal contains one or more protocols. If a proposal is
|
|
|
accepted, the SA response MUST contain the same protocols in the
|
|
|
same order as the proposal. The responder MUST accept a single
|
|
|
proposal or reject them all and return an error. (Example: if a
|
|
|
single proposal contains ESP and AH and that proposal is accepted,
|
|
|
both ESP and AH MUST be accepted. If ESP and AH are included in
|
|
|
separate proposals, the responder MUST accept only one of them).
|
|
|
|
|
|
Each IPsec protocol proposal contains one or more transforms.
|
|
|
Each transform contains a transform type. The accepted
|
|
|
cryptographic suite MUST contain exactly one transform of each
|
|
|
type included in the proposal. For example: if an ESP proposal
|
|
|
includes transforms ENCR_3DES, ENCR_AES w/keysize 128, ENCR_AES
|
|
|
w/keysize 256, AUTH_HMAC_MD5, and AUTH_HMAC_SHA, the accepted
|
|
|
suite MUST contain one of the ENCR_ transforms and one of the
|
|
|
AUTH_ transforms. Thus, six combinations are acceptable.
|
|
|
|
|
|
Since the initiator sends its Diffie-Hellman value in the
|
|
|
IKE_SA_INIT, it must guess the Diffie-Hellman group that the
|
|
|
responder will select from its list of supported groups. If the
|
|
|
initiator guesses wrong, the responder will respond with a Notify
|
|
|
payload of type INVALID_KE_PAYLOAD indicating the selected group. In
|
|
|
this case, the initiator MUST retry the IKE_SA_INIT with the
|
|
|
corrected Diffie-Hellman group. The initiator MUST again propose its
|
|
|
full set of acceptable cryptographic suites because the rejection
|
|
|
message was unauthenticated and otherwise an active attacker could
|
|
|
trick the endpoints into negotiating a weaker suite than a stronger
|
|
|
one that they both prefer.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 21]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
2.8. Rekeying
|
|
|
|
|
|
IKE, ESP, and AH security associations use secret keys that SHOULD be
|
|
|
used only for a limited amount of time and to protect a limited
|
|
|
amount of data. This limits the lifetime of the entire security
|
|
|
association. When the lifetime of a security association expires,
|
|
|
the security association MUST NOT be used. If there is demand, new
|
|
|
security associations MAY be established. Reestablishment of
|
|
|
security associations to take the place of ones that expire is
|
|
|
referred to as "rekeying".
|
|
|
|
|
|
To allow for minimal IPsec implementations, the ability to rekey SAs
|
|
|
without restarting the entire IKE_SA is optional. An implementation
|
|
|
MAY refuse all CREATE_CHILD_SA requests within an IKE_SA. If an SA
|
|
|
has expired or is about to expire and rekeying attempts using the
|
|
|
mechanisms described here fail, an implementation MUST close the
|
|
|
IKE_SA and any associated CHILD_SAs and then MAY start new ones.
|
|
|
Implementations SHOULD support in-place rekeying of SAs, since doing
|
|
|
so offers better performance and is likely to reduce the number of
|
|
|
packets lost during the transition.
|
|
|
|
|
|
To rekey a CHILD_SA within an existing IKE_SA, create a new,
|
|
|
equivalent SA (see section 2.17 below), and when the new one is
|
|
|
established, delete the old one. To rekey an IKE_SA, establish a new
|
|
|
equivalent IKE_SA (see section 2.18 below) with the peer to whom the
|
|
|
old IKE_SA is shared using a CREATE_CHILD_SA within the existing
|
|
|
IKE_SA. An IKE_SA so created inherits all of the original IKE_SA's
|
|
|
CHILD_SAs. Use the new IKE_SA for all control messages needed to
|
|
|
maintain the CHILD_SAs created by the old IKE_SA, and delete the old
|
|
|
IKE_SA. The Delete payload to delete itself MUST be the last request
|
|
|
sent over an IKE_SA.
|
|
|
|
|
|
SAs SHOULD be rekeyed proactively, i.e., the new SA should be
|
|
|
established before the old one expires and becomes unusable. Enough
|
|
|
time should elapse between the time the new SA is established and the
|
|
|
old one becomes unusable so that traffic can be switched over to the
|
|
|
new SA.
|
|
|
|
|
|
A difference between IKEv1 and IKEv2 is that in IKEv1 SA lifetimes
|
|
|
were negotiated. In IKEv2, each end of the SA is responsible for
|
|
|
enforcing its own lifetime policy on the SA and rekeying the SA when
|
|
|
necessary. If the two ends have different lifetime policies, the end
|
|
|
with the shorter lifetime will end up always being the one to request
|
|
|
the rekeying. If an SA bundle has been inactive for a long time and
|
|
|
if an endpoint would not initiate the SA in the absence of traffic,
|
|
|
the endpoint MAY choose to close the SA instead of rekeying it when
|
|
|
its lifetime expires. It SHOULD do so if there has been no traffic
|
|
|
since the last time the SA was rekeyed.
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 22]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
If the two ends have the same lifetime policies, it is possible that
|
|
|
both will initiate a rekeying at the same time (which will result in
|
|
|
redundant SAs). To reduce the probability of this happening, the
|
|
|
timing of rekeying requests SHOULD be jittered (delayed by a random
|
|
|
amount of time after the need for rekeying is noticed).
|
|
|
|
|
|
This form of rekeying may temporarily result in multiple similar SAs
|
|
|
between the same pairs of nodes. When there are two SAs eligible to
|
|
|
receive packets, a node MUST accept incoming packets through either
|
|
|
SA. If redundant SAs are created though such a collision, the SA
|
|
|
created with the lowest of the four nonces used in the two exchanges
|
|
|
SHOULD be closed by the endpoint that created it.
|
|
|
|
|
|
Note that IKEv2 deliberately allows parallel SAs with the same
|
|
|
traffic selectors between common endpoints. One of the purposes of
|
|
|
this is to support traffic quality of service (QoS) differences among
|
|
|
the SAs (see [RFC2474], [RFC2475], and section 4.1 of [RFC2983]).
|
|
|
Hence unlike IKEv1, the combination of the endpoints and the traffic
|
|
|
selectors may not uniquely identify an SA between those endpoints, so
|
|
|
the IKEv1 rekeying heuristic of deleting SAs on the basis of
|
|
|
duplicate traffic selectors SHOULD NOT be used.
|
|
|
|
|
|
The node that initiated the surviving rekeyed SA SHOULD delete the
|
|
|
replaced SA after the new one is established.
|
|
|
|
|
|
There are timing windows -- particularly in the presence of lost
|
|
|
packets -- where endpoints may not agree on the state of an SA. The
|
|
|
responder to a CREATE_CHILD_SA MUST be prepared to accept messages on
|
|
|
an SA before sending its response to the creation request, so there
|
|
|
is no ambiguity for the initiator. The initiator MAY begin sending
|
|
|
on an SA as soon as it processes the response. The initiator,
|
|
|
however, cannot receive on a newly created SA until it receives and
|
|
|
processes the response to its CREATE_CHILD_SA request. How, then, is
|
|
|
the responder to know when it is OK to send on the newly created SA?
|
|
|
|
|
|
From a technical correctness and interoperability perspective, the
|
|
|
responder MAY begin sending on an SA as soon as it sends its response
|
|
|
to the CREATE_CHILD_SA request. In some situations, however, this
|
|
|
could result in packets unnecessarily being dropped, so an
|
|
|
implementation MAY want to defer such sending.
|
|
|
|
|
|
The responder can be assured that the initiator is prepared to
|
|
|
receive messages on an SA if either (1) it has received a
|
|
|
cryptographically valid message on the new SA, or (2) the new SA
|
|
|
rekeys an existing SA and it receives an IKE request to close the
|
|
|
replaced SA. When rekeying an SA, the responder SHOULD continue to
|
|
|
send messages on the old SA until one of those events occurs. When
|
|
|
establishing a new SA, the responder MAY defer sending messages on a
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 23]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
new SA until either it receives one or a timeout has occurred. If an
|
|
|
initiator receives a message on an SA for which it has not received a
|
|
|
response to its CREATE_CHILD_SA request, it SHOULD interpret that as
|
|
|
a likely packet loss and retransmit the CREATE_CHILD_SA request. An
|
|
|
initiator MAY send a dummy message on a newly created SA if it has no
|
|
|
messages queued in order to assure the responder that the initiator
|
|
|
is ready to receive messages.
|
|
|
|
|
|
2.9. Traffic Selector Negotiation
|
|
|
|
|
|
When an IP packet is received by an RFC4301-compliant IPsec subsystem
|
|
|
and matches a "protect" selector in its Security Policy Database
|
|
|
(SPD), the subsystem MUST protect that packet with IPsec. When no SA
|
|
|
exists yet, it is the task of IKE to create it. Maintenance of a
|
|
|
system's SPD is outside the scope of IKE (see [PFKEY] for an example
|
|
|
protocol), though some implementations might update their SPD in
|
|
|
connection with the running of IKE (for an example scenario, see
|
|
|
section 1.1.3).
|
|
|
|
|
|
Traffic Selector (TS) payloads allow endpoints to communicate some of
|
|
|
the information from their SPD to their peers. TS payloads specify
|
|
|
the selection criteria for packets that will be forwarded over the
|
|
|
newly set up SA. This can serve as a consistency check in some
|
|
|
scenarios to assure that the SPDs are consistent. In others, it
|
|
|
guides the dynamic update of the SPD.
|
|
|
|
|
|
Two TS payloads appear in each of the messages in the exchange that
|
|
|
creates a CHILD_SA pair. Each TS payload contains one or more
|
|
|
Traffic Selectors. Each Traffic Selector consists of an address
|
|
|
range (IPv4 or IPv6), a port range, and an IP protocol ID. In
|
|
|
support of the scenario described in section 1.1.3, an initiator may
|
|
|
request that the responder assign an IP address and tell the
|
|
|
initiator what it is.
|
|
|
|
|
|
IKEv2 allows the responder to choose a subset of the traffic proposed
|
|
|
by the initiator. This could happen when the configurations of the
|
|
|
two endpoints are being updated but only one end has received the new
|
|
|
information. Since the two endpoints may be configured by different
|
|
|
people, the incompatibility may persist for an extended period even
|
|
|
in the absence of errors. It also allows for intentionally different
|
|
|
configurations, as when one end is configured to tunnel all addresses
|
|
|
and depends on the other end to have the up-to-date list.
|
|
|
|
|
|
The first of the two TS payloads is known as TSi (Traffic Selector-
|
|
|
initiator). The second is known as TSr (Traffic Selector-responder).
|
|
|
TSi specifies the source address of traffic forwarded from (or the
|
|
|
destination address of traffic forwarded to) the initiator of the
|
|
|
CHILD_SA pair. TSr specifies the destination address of the traffic
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 24]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
forwarded to (or the source address of the traffic forwarded from)
|
|
|
the responder of the CHILD_SA pair. For example, if the original
|
|
|
initiator request the creation of a CHILD_SA pair, and wishes to
|
|
|
tunnel all traffic from subnet 192.0.1.* on the initiator's side to
|
|
|
subnet 192.0.2.* on the responder's side, the initiator would include
|
|
|
a single traffic selector in each TS payload. TSi would specify the
|
|
|
address range (192.0.1.0 - 192.0.1.255) and TSr would specify the
|
|
|
address range (192.0.2.0 - 192.0.2.255). Assuming that proposal was
|
|
|
acceptable to the responder, it would send identical TS payloads
|
|
|
back. (Note: The IP address range 192.0.2.* has been reserved for
|
|
|
use in examples in RFCs and similar documents. This document needed
|
|
|
two such ranges, and so also used 192.0.1.*. This should not be
|
|
|
confused with any actual address.)
|
|
|
|
|
|
The responder is allowed to narrow the choices by selecting a subset
|
|
|
of the traffic, for instance by eliminating or narrowing the range of
|
|
|
one or more members of the set of traffic selectors, provided the set
|
|
|
does not become the NULL set.
|
|
|
|
|
|
It is possible for the responder's policy to contain multiple smaller
|
|
|
ranges, all encompassed by the initiator's traffic selector, and with
|
|
|
the responder's policy being that each of those ranges should be sent
|
|
|
over a different SA. Continuing the example above, the responder
|
|
|
might have a policy of being willing to tunnel those addresses to and
|
|
|
from the initiator, but might require that each address pair be on a
|
|
|
separately negotiated CHILD_SA. If the initiator generated its
|
|
|
request in response to an incoming packet from 192.0.1.43 to
|
|
|
192.0.2.123, there would be no way for the responder to determine
|
|
|
which pair of addresses should be included in this tunnel, and it
|
|
|
would have to make a guess or reject the request with a status of
|
|
|
SINGLE_PAIR_REQUIRED.
|
|
|
|
|
|
To enable the responder to choose the appropriate range in this case,
|
|
|
if the initiator has requested the SA due to a data packet, the
|
|
|
initiator SHOULD include as the first traffic selector in each of TSi
|
|
|
and TSr a very specific traffic selector including the addresses in
|
|
|
the packet triggering the request. In the example, the initiator
|
|
|
would include in TSi two traffic selectors: the first containing the
|
|
|
address range (192.0.1.43 - 192.0.1.43) and the source port and IP
|
|
|
protocol from the packet and the second containing (192.0.1.0 -
|
|
|
192.0.1.255) with all ports and IP protocols. The initiator would
|
|
|
similarly include two traffic selectors in TSr.
|
|
|
|
|
|
If the responder's policy does not allow it to accept the entire set
|
|
|
of traffic selectors in the initiator's request, but does allow him
|
|
|
to accept the first selector of TSi and TSr, then the responder MUST
|
|
|
narrow the traffic selectors to a subset that includes the
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 25]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
initiator's first choices. In this example, the responder might
|
|
|
respond with TSi being (192.0.1.43 - 192.0.1.43) with all ports and
|
|
|
IP protocols.
|
|
|
|
|
|
If the initiator creates the CHILD_SA pair not in response to an
|
|
|
arriving packet, but rather, say, upon startup, then there may be no
|
|
|
specific addresses the initiator prefers for the initial tunnel over
|
|
|
any other. In that case, the first values in TSi and TSr MAY be
|
|
|
ranges rather than specific values, and the responder chooses a
|
|
|
subset of the initiator's TSi and TSr that are acceptable. If more
|
|
|
than one subset is acceptable but their union is not, the responder
|
|
|
MUST accept some subset and MAY include a Notify payload of type
|
|
|
ADDITIONAL_TS_POSSIBLE to indicate that the initiator might want to
|
|
|
try again. This case will occur only when the initiator and
|
|
|
responder are configured differently from one another. If the
|
|
|
initiator and responder agree on the granularity of tunnels, the
|
|
|
initiator will never request a tunnel wider than the responder will
|
|
|
accept. Such misconfigurations SHOULD be recorded in error logs.
|
|
|
|
|
|
2.10. Nonces
|
|
|
|
|
|
The IKE_SA_INIT messages each contain a nonce. These nonces are used
|
|
|
as inputs to cryptographic functions. The CREATE_CHILD_SA request
|
|
|
and the CREATE_CHILD_SA response also contain nonces. These nonces
|
|
|
are used to add freshness to the key derivation technique used to
|
|
|
obtain keys for CHILD_SA, and to ensure creation of strong pseudo-
|
|
|
random bits from the Diffie-Hellman key. Nonces used in IKEv2 MUST
|
|
|
be randomly chosen, MUST be at least 128 bits in size, and MUST be at
|
|
|
least half the key size of the negotiated prf. ("prf" refers to
|
|
|
"pseudo-random function", one of the cryptographic algorithms
|
|
|
negotiated in the IKE exchange.) If the same random number source is
|
|
|
used for both keys and nonces, care must be taken to ensure that the
|
|
|
latter use does not compromise the former.
|
|
|
|
|
|
2.11. Address and Port Agility
|
|
|
|
|
|
IKE runs over UDP ports 500 and 4500, and implicitly sets up ESP and
|
|
|
AH associations for the same IP addresses it runs over. The IP
|
|
|
addresses and ports in the outer header are, however, not themselves
|
|
|
cryptographically protected, and IKE is designed to work even through
|
|
|
Network Address Translation (NAT) boxes. An implementation MUST
|
|
|
accept incoming requests even if the source port is not 500 or 4500,
|
|
|
and MUST respond to the address and port from which the request was
|
|
|
received. It MUST specify the address and port at which the request
|
|
|
was received as the source address and port in the response. IKE
|
|
|
functions identically over IPv4 or IPv6.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 26]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
2.12. Reuse of Diffie-Hellman Exponentials
|
|
|
|
|
|
IKE generates keying material using an ephemeral Diffie-Hellman
|
|
|
exchange in order to gain the property of "perfect forward secrecy".
|
|
|
This means that once a connection is closed and its corresponding
|
|
|
keys are forgotten, even someone who has recorded all of the data
|
|
|
from the connection and gets access to all of the long-term keys of
|
|
|
the two endpoints cannot reconstruct the keys used to protect the
|
|
|
conversation without doing a brute force search of the session key
|
|
|
space.
|
|
|
|
|
|
Achieving perfect forward secrecy requires that when a connection is
|
|
|
closed, each endpoint MUST forget not only the keys used by the
|
|
|
connection but also any information that could be used to recompute
|
|
|
those keys. In particular, it MUST forget the secrets used in the
|
|
|
Diffie-Hellman calculation and any state that may persist in the
|
|
|
state of a pseudo-random number generator that could be used to
|
|
|
recompute the Diffie-Hellman secrets.
|
|
|
|
|
|
Since the computing of Diffie-Hellman exponentials is computationally
|
|
|
expensive, an endpoint may find it advantageous to reuse those
|
|
|
exponentials for multiple connection setups. There are several
|
|
|
reasonable strategies for doing this. An endpoint could choose a new
|
|
|
exponential only periodically though this could result in less-than-
|
|
|
perfect forward secrecy if some connection lasts for less than the
|
|
|
lifetime of the exponential. Or it could keep track of which
|
|
|
exponential was used for each connection and delete the information
|
|
|
associated with the exponential only when some corresponding
|
|
|
connection was closed. This would allow the exponential to be reused
|
|
|
without losing perfect forward secrecy at the cost of maintaining
|
|
|
more state.
|
|
|
|
|
|
Decisions as to whether and when to reuse Diffie-Hellman exponentials
|
|
|
is a private decision in the sense that it will not affect
|
|
|
interoperability. An implementation that reuses exponentials MAY
|
|
|
choose to remember the exponential used by the other endpoint on past
|
|
|
exchanges and if one is reused to avoid the second half of the
|
|
|
calculation.
|
|
|
|
|
|
2.13. Generating Keying Material
|
|
|
|
|
|
In the context of the IKE_SA, four cryptographic algorithms are
|
|
|
negotiated: an encryption algorithm, an integrity protection
|
|
|
algorithm, a Diffie-Hellman group, and a pseudo-random function
|
|
|
(prf). The pseudo-random function is used for the construction of
|
|
|
keying material for all of the cryptographic algorithms used in both
|
|
|
the IKE_SA and the CHILD_SAs.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 27]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
We assume that each encryption algorithm and integrity protection
|
|
|
algorithm uses a fixed-size key and that any randomly chosen value of
|
|
|
that fixed size can serve as an appropriate key. For algorithms that
|
|
|
accept a variable length key, a fixed key size MUST be specified as
|
|
|
part of the cryptographic transform negotiated. For algorithms for
|
|
|
which not all values are valid keys (such as DES or 3DES with key
|
|
|
parity), the algorithm by which keys are derived from arbitrary
|
|
|
values MUST be specified by the cryptographic transform. For
|
|
|
integrity protection functions based on Hashed Message Authentication
|
|
|
Code (HMAC), the fixed key size is the size of the output of the
|
|
|
underlying hash function. When the prf function takes a variable
|
|
|
length key, variable length data, and produces a fixed-length output
|
|
|
(e.g., when using HMAC), the formulas in this document apply. When
|
|
|
the key for the prf function has fixed length, the data provided as a
|
|
|
key is truncated or padded with zeros as necessary unless exceptional
|
|
|
processing is explained following the formula.
|
|
|
|
|
|
Keying material will always be derived as the output of the
|
|
|
negotiated prf algorithm. Since the amount of keying material needed
|
|
|
may be greater than the size of the output of the prf algorithm, we
|
|
|
will use the prf iteratively. We will use the terminology prf+ to
|
|
|
describe the function that outputs a pseudo-random stream based on
|
|
|
the inputs to a prf as follows: (where | indicates concatenation)
|
|
|
|
|
|
prf+ (K,S) = T1 | T2 | T3 | T4 | ...
|
|
|
|
|
|
where:
|
|
|
T1 = prf (K, S | 0x01)
|
|
|
T2 = prf (K, T1 | S | 0x02)
|
|
|
T3 = prf (K, T2 | S | 0x03)
|
|
|
T4 = prf (K, T3 | S | 0x04)
|
|
|
|
|
|
continuing as needed to compute all required keys. The keys are
|
|
|
taken from the output string without regard to boundaries (e.g., if
|
|
|
the required keys are a 256-bit Advanced Encryption Standard (AES)
|
|
|
key and a 160-bit HMAC key, and the prf function generates 160 bits,
|
|
|
the AES key will come from T1 and the beginning of T2, while the HMAC
|
|
|
key will come from the rest of T2 and the beginning of T3).
|
|
|
|
|
|
The constant concatenated to the end of each string feeding the prf
|
|
|
is a single octet. prf+ in this document is not defined beyond 255
|
|
|
times the size of the prf output.
|
|
|
|
|
|
2.14. Generating Keying Material for the IKE_SA
|
|
|
|
|
|
The shared keys are computed as follows. A quantity called SKEYSEED
|
|
|
is calculated from the nonces exchanged during the IKE_SA_INIT
|
|
|
exchange and the Diffie-Hellman shared secret established during that
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 28]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
exchange. SKEYSEED is used to calculate seven other secrets: SK_d
|
|
|
used for deriving new keys for the CHILD_SAs established with this
|
|
|
IKE_SA; SK_ai and SK_ar used as a key to the integrity protection
|
|
|
algorithm for authenticating the component messages of subsequent
|
|
|
exchanges; SK_ei and SK_er used for encrypting (and of course
|
|
|
decrypting) all subsequent exchanges; and SK_pi and SK_pr, which are
|
|
|
used when generating an AUTH payload.
|
|
|
|
|
|
SKEYSEED and its derivatives are computed as follows:
|
|
|
|
|
|
SKEYSEED = prf(Ni | Nr, g^ir)
|
|
|
|
|
|
{SK_d | SK_ai | SK_ar | SK_ei | SK_er | SK_pi | SK_pr } = prf+
|
|
|
(SKEYSEED, Ni | Nr | SPIi | SPIr )
|
|
|
|
|
|
(indicating that the quantities SK_d, SK_ai, SK_ar, SK_ei, SK_er,
|
|
|
SK_pi, and SK_pr are taken in order from the generated bits of the
|
|
|
prf+). g^ir is the shared secret from the ephemeral Diffie-Hellman
|
|
|
exchange. g^ir is represented as a string of octets in big endian
|
|
|
order padded with zeros if necessary to make it the length of the
|
|
|
modulus. Ni and Nr are the nonces, stripped of any headers. If the
|
|
|
negotiated prf takes a fixed-length key and the lengths of Ni and Nr
|
|
|
do not add up to that length, half the bits must come from Ni and
|
|
|
half from Nr, taking the first bits of each.
|
|
|
|
|
|
The two directions of traffic flow use different keys. The keys used
|
|
|
to protect messages from the original initiator are SK_ai and SK_ei.
|
|
|
The keys used to protect messages in the other direction are SK_ar
|
|
|
and SK_er. Each algorithm takes a fixed number of bits of keying
|
|
|
material, which is specified as part of the algorithm. For integrity
|
|
|
algorithms based on a keyed hash, the key size is always equal to the
|
|
|
length of the output of the underlying hash function.
|
|
|
|
|
|
2.15. Authentication of the IKE_SA
|
|
|
|
|
|
When not using extensible authentication (see section 2.16), the
|
|
|
peers are authenticated by having each sign (or MAC using a shared
|
|
|
secret as the key) a block of data. For the responder, the octets to
|
|
|
be signed start with the first octet of the first SPI in the header
|
|
|
of the second message and end with the last octet of the last payload
|
|
|
in the second message. Appended to this (for purposes of computing
|
|
|
the signature) are the initiator's nonce Ni (just the value, not the
|
|
|
payload containing it), and the value prf(SK_pr,IDr') where IDr' is
|
|
|
the responder's ID payload excluding the fixed header. Note that
|
|
|
neither the nonce Ni nor the value prf(SK_pr,IDr') are transmitted.
|
|
|
Similarly, the initiator signs the first message, starting with the
|
|
|
first octet of the first SPI in the header and ending with the last
|
|
|
octet of the last payload. Appended to this (for purposes of
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 29]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
computing the signature) are the responder's nonce Nr, and the value
|
|
|
prf(SK_pi,IDi'). In the above calculation, IDi' and IDr' are the
|
|
|
entire ID payloads excluding the fixed header. It is critical to the
|
|
|
security of the exchange that each side sign the other side's nonce.
|
|
|
|
|
|
Note that all of the payloads are included under the signature,
|
|
|
including any payload types not defined in this document. If the
|
|
|
first message of the exchange is sent twice (the second time with a
|
|
|
responder cookie and/or a different Diffie-Hellman group), it is the
|
|
|
second version of the message that is signed.
|
|
|
|
|
|
Optionally, messages 3 and 4 MAY include a certificate, or
|
|
|
certificate chain providing evidence that the key used to compute a
|
|
|
digital signature belongs to the name in the ID payload. The
|
|
|
signature or MAC will be computed using algorithms dictated by the
|
|
|
type of key used by the signer, and specified by the Auth Method
|
|
|
field in the Authentication payload. There is no requirement that
|
|
|
the initiator and responder sign with the same cryptographic
|
|
|
algorithms. The choice of cryptographic algorithms depends on the
|
|
|
type of key each has. In particular, the initiator may be using a
|
|
|
shared key while the responder may have a public signature key and
|
|
|
certificate. It will commonly be the case (but it is not required)
|
|
|
that if a shared secret is used for authentication that the same key
|
|
|
is used in both directions. Note that it is a common but typically
|
|
|
insecure practice to have a shared key derived solely from a user-
|
|
|
chosen password without incorporating another source of randomness.
|
|
|
|
|
|
This is typically insecure because user-chosen passwords are unlikely
|
|
|
to have sufficient unpredictability to resist dictionary attacks and
|
|
|
these attacks are not prevented in this authentication method.
|
|
|
(Applications using password-based authentication for bootstrapping
|
|
|
and IKE_SA should use the authentication method in section 2.16,
|
|
|
which is designed to prevent off-line dictionary attacks.) The pre-
|
|
|
shared key SHOULD contain as much unpredictability as the strongest
|
|
|
key being negotiated. In the case of a pre-shared key, the AUTH
|
|
|
value is computed as:
|
|
|
|
|
|
AUTH = prf(prf(Shared Secret,"Key Pad for IKEv2"), <msg octets>)
|
|
|
|
|
|
where the string "Key Pad for IKEv2" is 17 ASCII characters without
|
|
|
null termination. The shared secret can be variable length. The pad
|
|
|
string is added so that if the shared secret is derived from a
|
|
|
password, the IKE implementation need not store the password in
|
|
|
cleartext, but rather can store the value prf(Shared Secret,"Key Pad
|
|
|
for IKEv2"), which could not be used as a password equivalent for
|
|
|
protocols other than IKEv2. As noted above, deriving the shared
|
|
|
secret from a password is not secure. This construction is used
|
|
|
because it is anticipated that people will do it anyway. The
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 30]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
management interface by which the Shared Secret is provided MUST
|
|
|
accept ASCII strings of at least 64 octets and MUST NOT add a null
|
|
|
terminator before using them as shared secrets. It MUST also accept
|
|
|
a HEX encoding of the Shared Secret. The management interface MAY
|
|
|
accept other encodings if the algorithm for translating the encoding
|
|
|
to a binary string is specified. If the negotiated prf takes a
|
|
|
fixed-size key, the shared secret MUST be of that fixed size.
|
|
|
|
|
|
2.16. Extensible Authentication Protocol Methods
|
|
|
|
|
|
In addition to authentication using public key signatures and shared
|
|
|
secrets, IKE supports authentication using methods defined in RFC
|
|
|
3748 [EAP]. Typically, these methods are asymmetric (designed for a
|
|
|
user authenticating to a server), and they may not be mutual. For
|
|
|
this reason, these protocols are typically used to authenticate the
|
|
|
initiator to the responder and MUST be used in conjunction with a
|
|
|
public key signature based authentication of the responder to the
|
|
|
initiator. These methods are often associated with mechanisms
|
|
|
referred to as "Legacy Authentication" mechanisms.
|
|
|
|
|
|
While this memo references [EAP] with the intent that new methods can
|
|
|
be added in the future without updating this specification, some
|
|
|
simpler variations are documented here and in section 3.16. [EAP]
|
|
|
defines an authentication protocol requiring a variable number of
|
|
|
messages. Extensible Authentication is implemented in IKE as
|
|
|
additional IKE_AUTH exchanges that MUST be completed in order to
|
|
|
initialize the IKE_SA.
|
|
|
|
|
|
An initiator indicates a desire to use extensible authentication by
|
|
|
leaving out the AUTH payload from message 3. By including an IDi
|
|
|
payload but not an AUTH payload, the initiator has declared an
|
|
|
identity but has not proven it. If the responder is willing to use
|
|
|
an extensible authentication method, it will place an Extensible
|
|
|
Authentication Protocol (EAP) payload in message 4 and defer sending
|
|
|
SAr2, TSi, and TSr until initiator authentication is complete in a
|
|
|
subsequent IKE_AUTH exchange. In the case of a minimal extensible
|
|
|
authentication, the initial SA establishment will appear as follows:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 31]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
Initiator Responder
|
|
|
----------- -----------
|
|
|
HDR, SAi1, KEi, Ni -->
|
|
|
|
|
|
<-- HDR, SAr1, KEr, Nr, [CERTREQ]
|
|
|
|
|
|
HDR, SK {IDi, [CERTREQ,] [IDr,]
|
|
|
SAi2, TSi, TSr} -->
|
|
|
|
|
|
<-- HDR, SK {IDr, [CERT,] AUTH,
|
|
|
EAP }
|
|
|
|
|
|
HDR, SK {EAP} -->
|
|
|
|
|
|
<-- HDR, SK {EAP (success)}
|
|
|
|
|
|
HDR, SK {AUTH} -->
|
|
|
|
|
|
<-- HDR, SK {AUTH, SAr2, TSi, TSr }
|
|
|
|
|
|
For EAP methods that create a shared key as a side effect of
|
|
|
authentication, that shared key MUST be used by both the initiator
|
|
|
and responder to generate AUTH payloads in messages 7 and 8 using the
|
|
|
syntax for shared secrets specified in section 2.15. The shared key
|
|
|
from EAP is the field from the EAP specification named MSK. The
|
|
|
shared key generated during an IKE exchange MUST NOT be used for any
|
|
|
other purpose.
|
|
|
|
|
|
EAP methods that do not establish a shared key SHOULD NOT be used, as
|
|
|
they are subject to a number of man-in-the-middle attacks [EAPMITM]
|
|
|
if these EAP methods are used in other protocols that do not use a
|
|
|
server-authenticated tunnel. Please see the Security Considerations
|
|
|
section for more details. If EAP methods that do not generate a
|
|
|
shared key are used, the AUTH payloads in messages 7 and 8 MUST be
|
|
|
generated using SK_pi and SK_pr, respectively.
|
|
|
|
|
|
The initiator of an IKE_SA using EAP SHOULD be capable of extending
|
|
|
the initial protocol exchange to at least ten IKE_AUTH exchanges in
|
|
|
the event the responder sends notification messages and/or retries
|
|
|
the authentication prompt. Once the protocol exchange defined by the
|
|
|
chosen EAP authentication method has successfully terminated, the
|
|
|
responder MUST send an EAP payload containing the Success message.
|
|
|
Similarly, if the authentication method has failed, the responder
|
|
|
MUST send an EAP payload containing the Failure message. The
|
|
|
responder MAY at any time terminate the IKE exchange by sending an
|
|
|
EAP payload containing the Failure message.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 32]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
Following such an extended exchange, the EAP AUTH payloads MUST be
|
|
|
included in the two messages following the one containing the EAP
|
|
|
Success message.
|
|
|
|
|
|
2.17. Generating Keying Material for CHILD_SAs
|
|
|
|
|
|
A single CHILD_SA is created by the IKE_AUTH exchange, and additional
|
|
|
CHILD_SAs can optionally be created in CREATE_CHILD_SA exchanges.
|
|
|
Keying material for them is generated as follows:
|
|
|
|
|
|
KEYMAT = prf+(SK_d, Ni | Nr)
|
|
|
|
|
|
Where Ni and Nr are the nonces from the IKE_SA_INIT exchange if this
|
|
|
request is the first CHILD_SA created or the fresh Ni and Nr from the
|
|
|
CREATE_CHILD_SA exchange if this is a subsequent creation.
|
|
|
|
|
|
For CREATE_CHILD_SA exchanges including an optional Diffie-Hellman
|
|
|
exchange, the keying material is defined as:
|
|
|
|
|
|
KEYMAT = prf+(SK_d, g^ir (new) | Ni | Nr )
|
|
|
|
|
|
where g^ir (new) is the shared secret from the ephemeral Diffie-
|
|
|
Hellman exchange of this CREATE_CHILD_SA exchange (represented as an
|
|
|
octet string in big endian order padded with zeros in the high-order
|
|
|
bits if necessary to make it the length of the modulus).
|
|
|
|
|
|
A single CHILD_SA negotiation may result in multiple security
|
|
|
associations. ESP and AH SAs exist in pairs (one in each direction),
|
|
|
and four SAs could be created in a single CHILD_SA negotiation if a
|
|
|
combination of ESP and AH is being negotiated.
|
|
|
|
|
|
Keying material MUST be taken from the expanded KEYMAT in the
|
|
|
following order:
|
|
|
|
|
|
All keys for SAs carrying data from the initiator to the responder
|
|
|
are taken before SAs going in the reverse direction.
|
|
|
|
|
|
If multiple IPsec protocols are negotiated, keying material is
|
|
|
taken in the order in which the protocol headers will appear in
|
|
|
the encapsulated packet.
|
|
|
|
|
|
If a single protocol has both encryption and authentication keys,
|
|
|
the encryption key is taken from the first octets of KEYMAT and
|
|
|
the authentication key is taken from the next octets.
|
|
|
|
|
|
Each cryptographic algorithm takes a fixed number of bits of keying
|
|
|
material specified as part of the algorithm.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 33]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
2.18. Rekeying IKE_SAs Using a CREATE_CHILD_SA exchange
|
|
|
|
|
|
The CREATE_CHILD_SA exchange can be used to rekey an existing IKE_SA
|
|
|
(see section 2.8). New initiator and responder SPIs are supplied in
|
|
|
the SPI fields. The TS payloads are omitted when rekeying an IKE_SA.
|
|
|
SKEYSEED for the new IKE_SA is computed using SK_d from the existing
|
|
|
IKE_SA as follows:
|
|
|
|
|
|
SKEYSEED = prf(SK_d (old), [g^ir (new)] | Ni | Nr)
|
|
|
|
|
|
where g^ir (new) is the shared secret from the ephemeral Diffie-
|
|
|
Hellman exchange of this CREATE_CHILD_SA exchange (represented as an
|
|
|
octet string in big endian order padded with zeros if necessary to
|
|
|
make it the length of the modulus) and Ni and Nr are the two nonces
|
|
|
stripped of any headers.
|
|
|
|
|
|
The new IKE_SA MUST reset its message counters to 0.
|
|
|
|
|
|
SK_d, SK_ai, SK_ar, SK_ei, and SK_er are computed from SKEYSEED as
|
|
|
specified in section 2.14.
|
|
|
|
|
|
2.19. Requesting an Internal Address on a Remote Network
|
|
|
|
|
|
Most commonly occurring in the endpoint-to-security-gateway scenario,
|
|
|
an endpoint may need an IP address in the network protected by the
|
|
|
security gateway and may need to have that address dynamically
|
|
|
assigned. A request for such a temporary address can be included in
|
|
|
any request to create a CHILD_SA (including the implicit request in
|
|
|
message 3) by including a CP payload.
|
|
|
|
|
|
This function provides address allocation to an IPsec Remote Access
|
|
|
Client (IRAC) trying to tunnel into a network protected by an IPsec
|
|
|
Remote Access Server (IRAS). Since the IKE_AUTH exchange creates an
|
|
|
IKE_SA and a CHILD_SA, the IRAC MUST request the IRAS-controlled
|
|
|
address (and optionally other information concerning the protected
|
|
|
network) in the IKE_AUTH exchange. The IRAS may procure an address
|
|
|
for the IRAC from any number of sources such as a DHCP/BOOTP server
|
|
|
or its own address pool.
|
|
|
|
|
|
Initiator Responder
|
|
|
----------------------------- ---------------------------
|
|
|
HDR, SK {IDi, [CERT,] [CERTREQ,]
|
|
|
[IDr,] AUTH, CP(CFG_REQUEST),
|
|
|
SAi2, TSi, TSr} -->
|
|
|
|
|
|
<-- HDR, SK {IDr, [CERT,] AUTH,
|
|
|
CP(CFG_REPLY), SAr2,
|
|
|
TSi, TSr}
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 34]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
In all cases, the CP payload MUST be inserted before the SA payload.
|
|
|
In variations of the protocol where there are multiple IKE_AUTH
|
|
|
exchanges, the CP payloads MUST be inserted in the messages
|
|
|
containing the SA payloads.
|
|
|
|
|
|
CP(CFG_REQUEST) MUST contain at least an INTERNAL_ADDRESS attribute
|
|
|
(either IPv4 or IPv6) but MAY contain any number of additional
|
|
|
attributes the initiator wants returned in the response.
|
|
|
|
|
|
For example, message from initiator to responder:
|
|
|
CP(CFG_REQUEST)=
|
|
|
INTERNAL_ADDRESS(0.0.0.0)
|
|
|
INTERNAL_NETMASK(0.0.0.0)
|
|
|
INTERNAL_DNS(0.0.0.0)
|
|
|
TSi = (0, 0-65535,0.0.0.0-255.255.255.255)
|
|
|
TSr = (0, 0-65535,0.0.0.0-255.255.255.255)
|
|
|
|
|
|
NOTE: Traffic Selectors contain (protocol, port range, address
|
|
|
range).
|
|
|
|
|
|
Message from responder to initiator:
|
|
|
|
|
|
CP(CFG_REPLY)=
|
|
|
INTERNAL_ADDRESS(192.0.2.202)
|
|
|
INTERNAL_NETMASK(255.255.255.0)
|
|
|
INTERNAL_SUBNET(192.0.2.0/255.255.255.0)
|
|
|
TSi = (0, 0-65535,192.0.2.202-192.0.2.202)
|
|
|
TSr = (0, 0-65535,192.0.2.0-192.0.2.255)
|
|
|
|
|
|
All returned values will be implementation dependent. As can be seen
|
|
|
in the above example, the IRAS MAY also send other attributes that
|
|
|
were not included in CP(CFG_REQUEST) and MAY ignore the non-mandatory
|
|
|
attributes that it does not support.
|
|
|
|
|
|
The responder MUST NOT send a CFG_REPLY without having first received
|
|
|
a CP(CFG_REQUEST) from the initiator, because we do not want the IRAS
|
|
|
to perform an unnecessary configuration lookup if the IRAC cannot
|
|
|
process the REPLY. In the case where the IRAS's configuration
|
|
|
requires that CP be used for a given identity IDi, but IRAC has
|
|
|
failed to send a CP(CFG_REQUEST), IRAS MUST fail the request, and
|
|
|
terminate the IKE exchange with a FAILED_CP_REQUIRED error.
|
|
|
|
|
|
2.20. Requesting the Peer's Version
|
|
|
|
|
|
An IKE peer wishing to inquire about the other peer's IKE software
|
|
|
version information MAY use the method below. This is an example of
|
|
|
a configuration request within an INFORMATIONAL exchange, after the
|
|
|
IKE_SA and first CHILD_SA have been created.
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 35]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
An IKE implementation MAY decline to give out version information
|
|
|
prior to authentication or even after authentication to prevent
|
|
|
trolling in case some implementation is known to have some security
|
|
|
weakness. In that case, it MUST either return an empty string or no
|
|
|
CP payload if CP is not supported.
|
|
|
|
|
|
Initiator Responder
|
|
|
----------------------------- --------------------------
|
|
|
HDR, SK{CP(CFG_REQUEST)} -->
|
|
|
<-- HDR, SK{CP(CFG_REPLY)}
|
|
|
|
|
|
CP(CFG_REQUEST)=
|
|
|
APPLICATION_VERSION("")
|
|
|
|
|
|
CP(CFG_REPLY) APPLICATION_VERSION("foobar v1.3beta, (c) Foo Bar
|
|
|
Inc.")
|
|
|
|
|
|
2.21. Error Handling
|
|
|
|
|
|
There are many kinds of errors that can occur during IKE processing.
|
|
|
If a request is received that is badly formatted or unacceptable for
|
|
|
reasons of policy (e.g., no matching cryptographic algorithms), the
|
|
|
response MUST contain a Notify payload indicating the error. If an
|
|
|
error occurs outside the context of an IKE request (e.g., the node is
|
|
|
getting ESP messages on a nonexistent SPI), the node SHOULD initiate
|
|
|
an INFORMATIONAL exchange with a Notify payload describing the
|
|
|
problem.
|
|
|
|
|
|
Errors that occur before a cryptographically protected IKE_SA is
|
|
|
established must be handled very carefully. There is a trade-off
|
|
|
between wanting to be helpful in diagnosing a problem and responding
|
|
|
to it and wanting to avoid being a dupe in a denial of service attack
|
|
|
based on forged messages.
|
|
|
|
|
|
If a node receives a message on UDP port 500 or 4500 outside the
|
|
|
context of an IKE_SA known to it (and not a request to start one), it
|
|
|
may be the result of a recent crash of the node. If the message is
|
|
|
marked as a response, the node MAY audit the suspicious event but
|
|
|
MUST NOT respond. If the message is marked as a request, the node
|
|
|
MAY audit the suspicious event and MAY send a response. If a
|
|
|
response is sent, the response MUST be sent to the IP address and
|
|
|
port from whence it came with the same IKE SPIs and the Message ID
|
|
|
copied. The response MUST NOT be cryptographically protected and
|
|
|
MUST contain a Notify payload indicating INVALID_IKE_SPI.
|
|
|
|
|
|
A node receiving such an unprotected Notify payload MUST NOT respond
|
|
|
and MUST NOT change the state of any existing SAs. The message might
|
|
|
be a forgery or might be a response the genuine correspondent was
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 36]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
tricked into sending. A node SHOULD treat such a message (and also a
|
|
|
network message like ICMP destination unreachable) as a hint that
|
|
|
there might be problems with SAs to that IP address and SHOULD
|
|
|
initiate a liveness test for any such IKE_SA. An implementation
|
|
|
SHOULD limit the frequency of such tests to avoid being tricked into
|
|
|
participating in a denial of service attack.
|
|
|
|
|
|
A node receiving a suspicious message from an IP address with which
|
|
|
it has an IKE_SA MAY send an IKE Notify payload in an IKE
|
|
|
INFORMATIONAL exchange over that SA. The recipient MUST NOT change
|
|
|
the state of any SA's as a result but SHOULD audit the event to aid
|
|
|
in diagnosing malfunctions. A node MUST limit the rate at which it
|
|
|
will send messages in response to unprotected messages.
|
|
|
|
|
|
2.22. IPComp
|
|
|
|
|
|
Use of IP compression [IPCOMP] can be negotiated as part of the setup
|
|
|
of a CHILD_SA. While IP compression involves an extra header in each
|
|
|
packet and a compression parameter index (CPI), the virtual
|
|
|
"compression association" has no life outside the ESP or AH SA that
|
|
|
contains it. Compression associations disappear when the
|
|
|
corresponding ESP or AH SA goes away. It is not explicitly mentioned
|
|
|
in any DELETE payload.
|
|
|
|
|
|
Negotiation of IP compression is separate from the negotiation of
|
|
|
cryptographic parameters associated with a CHILD_SA. A node
|
|
|
requesting a CHILD_SA MAY advertise its support for one or more
|
|
|
compression algorithms through one or more Notify payloads of type
|
|
|
IPCOMP_SUPPORTED. The response MAY indicate acceptance of a single
|
|
|
compression algorithm with a Notify payload of type IPCOMP_SUPPORTED.
|
|
|
These payloads MUST NOT occur in messages that do not contain SA
|
|
|
payloads.
|
|
|
|
|
|
Although there has been discussion of allowing multiple compression
|
|
|
algorithms to be accepted and to have different compression
|
|
|
algorithms available for the two directions of a CHILD_SA,
|
|
|
implementations of this specification MUST NOT accept an IPComp
|
|
|
algorithm that was not proposed, MUST NOT accept more than one, and
|
|
|
MUST NOT compress using an algorithm other than one proposed and
|
|
|
accepted in the setup of the CHILD_SA.
|
|
|
|
|
|
A side effect of separating the negotiation of IPComp from
|
|
|
cryptographic parameters is that it is not possible to propose
|
|
|
multiple cryptographic suites and propose IP compression with some of
|
|
|
them but not others.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 37]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
2.23. NAT Traversal
|
|
|
|
|
|
Network Address Translation (NAT) gateways are a controversial
|
|
|
subject. This section briefly describes what they are and how they
|
|
|
are likely to act on IKE traffic. Many people believe that NATs are
|
|
|
evil and that we should not design our protocols so as to make them
|
|
|
work better. IKEv2 does specify some unintuitive processing rules in
|
|
|
order that NATs are more likely to work.
|
|
|
|
|
|
NATs exist primarily because of the shortage of IPv4 addresses,
|
|
|
though there are other rationales. IP nodes that are "behind" a NAT
|
|
|
have IP addresses that are not globally unique, but rather are
|
|
|
assigned from some space that is unique within the network behind the
|
|
|
NAT but that are likely to be reused by nodes behind other NATs.
|
|
|
Generally, nodes behind NATs can communicate with other nodes behind
|
|
|
the same NAT and with nodes with globally unique addresses, but not
|
|
|
with nodes behind other NATs. There are exceptions to that rule.
|
|
|
When those nodes make connections to nodes on the real Internet, the
|
|
|
NAT gateway "translates" the IP source address to an address that
|
|
|
will be routed back to the gateway. Messages to the gateway from the
|
|
|
Internet have their destination addresses "translated" to the
|
|
|
internal address that will route the packet to the correct endnode.
|
|
|
|
|
|
NATs are designed to be "transparent" to endnodes. Neither software
|
|
|
on the node behind the NAT nor the node on the Internet requires
|
|
|
modification to communicate through the NAT. Achieving this
|
|
|
transparency is more difficult with some protocols than with others.
|
|
|
Protocols that include IP addresses of the endpoints within the
|
|
|
payloads of the packet will fail unless the NAT gateway understands
|
|
|
the protocol and modifies the internal references as well as those in
|
|
|
the headers. Such knowledge is inherently unreliable, is a network
|
|
|
layer violation, and often results in subtle problems.
|
|
|
|
|
|
Opening an IPsec connection through a NAT introduces special
|
|
|
problems. If the connection runs in transport mode, changing the IP
|
|
|
addresses on packets will cause the checksums to fail and the NAT
|
|
|
cannot correct the checksums because they are cryptographically
|
|
|
protected. Even in tunnel mode, there are routing problems because
|
|
|
transparently translating the addresses of AH and ESP packets
|
|
|
requires special logic in the NAT and that logic is heuristic and
|
|
|
unreliable in nature. For that reason, IKEv2 can negotiate UDP
|
|
|
encapsulation of IKE and ESP packets. This encoding is slightly less
|
|
|
efficient but is easier for NATs to process. In addition, firewalls
|
|
|
may be configured to pass IPsec traffic over UDP but not ESP/AH or
|
|
|
vice versa.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 38]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
It is a common practice of NATs to translate TCP and UDP port numbers
|
|
|
as well as addresses and use the port numbers of inbound packets to
|
|
|
decide which internal node should get a given packet. For this
|
|
|
reason, even though IKE packets MUST be sent from and to UDP port
|
|
|
500, they MUST be accepted coming from any port and responses MUST be
|
|
|
sent to the port from whence they came. This is because the ports
|
|
|
may be modified as the packets pass through NATs. Similarly, IP
|
|
|
addresses of the IKE endpoints are generally not included in the IKE
|
|
|
payloads because the payloads are cryptographically protected and
|
|
|
could not be transparently modified by NATs.
|
|
|
|
|
|
Port 4500 is reserved for UDP-encapsulated ESP and IKE. When working
|
|
|
through a NAT, it is generally better to pass IKE packets over port
|
|
|
4500 because some older NATs handle IKE traffic on port 500 cleverly
|
|
|
in an attempt to transparently establish IPsec connections between
|
|
|
endpoints that don't handle NAT traversal themselves. Such NATs may
|
|
|
interfere with the straightforward NAT traversal envisioned by this
|
|
|
document, so an IPsec endpoint that discovers a NAT between it and
|
|
|
its correspondent MUST send all subsequent traffic to and from port
|
|
|
4500, which NATs should not treat specially (as they might with port
|
|
|
500).
|
|
|
|
|
|
The specific requirements for supporting NAT traversal [RFC3715] are
|
|
|
listed below. Support for NAT traversal is optional. In this
|
|
|
section only, requirements listed as MUST apply only to
|
|
|
implementations supporting NAT traversal.
|
|
|
|
|
|
IKE MUST listen on port 4500 as well as port 500. IKE MUST
|
|
|
respond to the IP address and port from which packets arrived.
|
|
|
|
|
|
Both IKE initiator and responder MUST include in their IKE_SA_INIT
|
|
|
packets Notify payloads of type NAT_DETECTION_SOURCE_IP and
|
|
|
NAT_DETECTION_DESTINATION_IP. Those payloads can be used to
|
|
|
detect if there is NAT between the hosts, and which end is behind
|
|
|
the NAT. The location of the payloads in the IKE_SA_INIT packets
|
|
|
are just after the Ni and Nr payloads (before the optional CERTREQ
|
|
|
payload).
|
|
|
|
|
|
If none of the NAT_DETECTION_SOURCE_IP payload(s) received matches
|
|
|
the hash of the source IP and port found from the IP header of the
|
|
|
packet containing the payload, it means that the other end is
|
|
|
behind NAT (i.e., someone along the route changed the source
|
|
|
address of the original packet to match the address of the NAT
|
|
|
box). In this case, this end should allow dynamic update of the
|
|
|
other ends IP address, as described later.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 39]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
If the NAT_DETECTION_DESTINATION_IP payload received does not
|
|
|
match the hash of the destination IP and port found from the IP
|
|
|
header of the packet containing the payload, it means that this
|
|
|
end is behind a NAT. In this case, this end SHOULD start sending
|
|
|
keepalive packets as explained in [Hutt05].
|
|
|
|
|
|
The IKE initiator MUST check these payloads if present and if they
|
|
|
do not match the addresses in the outer packet MUST tunnel all
|
|
|
future IKE and ESP packets associated with this IKE_SA over UDP
|
|
|
port 4500.
|
|
|
|
|
|
To tunnel IKE packets over UDP port 4500, the IKE header has four
|
|
|
octets of zero prepended and the result immediately follows the
|
|
|
UDP header. To tunnel ESP packets over UDP port 4500, the ESP
|
|
|
header immediately follows the UDP header. Since the first four
|
|
|
bytes of the ESP header contain the SPI, and the SPI cannot
|
|
|
validly be zero, it is always possible to distinguish ESP and IKE
|
|
|
messages.
|
|
|
|
|
|
The original source and destination IP address required for the
|
|
|
transport mode TCP and UDP packet checksum fixup (see [Hutt05])
|
|
|
are obtained from the Traffic Selectors associated with the
|
|
|
exchange. In the case of NAT traversal, the Traffic Selectors
|
|
|
MUST contain exactly one IP address, which is then used as the
|
|
|
original IP address.
|
|
|
|
|
|
There are cases where a NAT box decides to remove mappings that
|
|
|
are still alive (for example, the keepalive interval is too long,
|
|
|
or the NAT box is rebooted). To recover in these cases, hosts
|
|
|
that are not behind a NAT SHOULD send all packets (including
|
|
|
retransmission packets) to the IP address and port from the last
|
|
|
valid authenticated packet from the other end (i.e., dynamically
|
|
|
update the address). A host behind a NAT SHOULD NOT do this
|
|
|
because it opens a DoS attack possibility. Any authenticated IKE
|
|
|
packet or any authenticated UDP-encapsulated ESP packet can be
|
|
|
used to detect that the IP address or the port has changed.
|
|
|
|
|
|
Note that similar but probably not identical actions will likely
|
|
|
be needed to make IKE work with Mobile IP, but such processing is
|
|
|
not addressed by this document.
|
|
|
|
|
|
2.24. Explicit Congestion Notification (ECN)
|
|
|
|
|
|
When IPsec tunnels behave as originally specified in [RFC2401], ECN
|
|
|
usage is not appropriate for the outer IP headers because tunnel
|
|
|
decapsulation processing discards ECN congestion indications to the
|
|
|
detriment of the network. ECN support for IPsec tunnels for IKEv1-
|
|
|
based IPsec requires multiple operating modes and negotiation (see
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 40]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
[RFC3168]). IKEv2 simplifies this situation by requiring that ECN be
|
|
|
usable in the outer IP headers of all tunnel-mode IPsec SAs created
|
|
|
by IKEv2. Specifically, tunnel encapsulators and decapsulators for
|
|
|
all tunnel-mode SAs created by IKEv2 MUST support the ECN full-
|
|
|
functionality option for tunnels specified in [RFC3168] and MUST
|
|
|
implement the tunnel encapsulation and decapsulation processing
|
|
|
specified in [RFC4301] to prevent discarding of ECN congestion
|
|
|
indications.
|
|
|
|
|
|
3. Header and Payload Formats
|
|
|
|
|
|
3.1. The IKE Header
|
|
|
|
|
|
IKE messages use UDP ports 500 and/or 4500, with one IKE message per
|
|
|
UDP datagram. Information from the beginning of the packet through
|
|
|
the UDP header is largely ignored except that the IP addresses and
|
|
|
UDP ports from the headers are reversed and used for return packets.
|
|
|
When sent on UDP port 500, IKE messages begin immediately following
|
|
|
the UDP header. When sent on UDP port 4500, IKE messages have
|
|
|
prepended four octets of zero. These four octets of zero are not
|
|
|
part of the IKE message and are not included in any of the length
|
|
|
fields or checksums defined by IKE. Each IKE message begins with the
|
|
|
IKE header, denoted HDR in this memo. Following the header are one
|
|
|
or more IKE payloads each identified by a "Next Payload" field in the
|
|
|
preceding payload. Payloads are processed in the order in which they
|
|
|
appear in an IKE message by invoking the appropriate processing
|
|
|
routine according to the "Next Payload" field in the IKE header and
|
|
|
subsequently according to the "Next Payload" field in the IKE payload
|
|
|
itself until a "Next Payload" field of zero indicates that no
|
|
|
payloads follow. If a payload of type "Encrypted" is found, that
|
|
|
payload is decrypted and its contents parsed as additional payloads.
|
|
|
An Encrypted payload MUST be the last payload in a packet and an
|
|
|
Encrypted payload MUST NOT contain another Encrypted payload.
|
|
|
|
|
|
The Recipient SPI in the header identifies an instance of an IKE
|
|
|
security association. It is therefore possible for a single instance
|
|
|
of IKE to multiplex distinct sessions with multiple peers.
|
|
|
|
|
|
All multi-octet fields representing integers are laid out in big
|
|
|
endian order (aka most significant byte first, or network byte
|
|
|
order).
|
|
|
|
|
|
The format of the IKE header is shown in Figure 4.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 41]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
1 2 3
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
! IKE_SA Initiator's SPI !
|
|
|
! !
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
! IKE_SA Responder's SPI !
|
|
|
! !
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
! Next Payload ! MjVer ! MnVer ! Exchange Type ! Flags !
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
! Message ID !
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
! Length !
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
|
|
Figure 4: IKE Header Format
|
|
|
|
|
|
o Initiator's SPI (8 octets) - A value chosen by the
|
|
|
initiator to identify a unique IKE security association. This
|
|
|
value MUST NOT be zero.
|
|
|
|
|
|
o Responder's SPI (8 octets) - A value chosen by the
|
|
|
responder to identify a unique IKE security association. This
|
|
|
value MUST be zero in the first message of an IKE Initial
|
|
|
Exchange (including repeats of that message including a
|
|
|
cookie) and MUST NOT be zero in any other message.
|
|
|
|
|
|
o Next Payload (1 octet) - Indicates the type of payload that
|
|
|
immediately follows the header. The format and value of each
|
|
|
payload are defined below.
|
|
|
|
|
|
o Major Version (4 bits) - Indicates the major version of the IKE
|
|
|
protocol in use. Implementations based on this version of IKE
|
|
|
MUST set the Major Version to 2. Implementations based on
|
|
|
previous versions of IKE and ISAKMP MUST set the Major Version
|
|
|
to 1. Implementations based on this version of IKE MUST reject
|
|
|
or ignore messages containing a version number greater than
|
|
|
2.
|
|
|
|
|
|
o Minor Version (4 bits) - Indicates the minor version of the
|
|
|
IKE protocol in use. Implementations based on this version of
|
|
|
IKE MUST set the Minor Version to 0. They MUST ignore the
|
|
|
minor version number of received messages.
|
|
|
|
|
|
o Exchange Type (1 octet) - Indicates the type of exchange being
|
|
|
used. This constrains the payloads sent in each message and
|
|
|
orderings of messages in an exchange.
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 42]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
Exchange Type Value
|
|
|
|
|
|
RESERVED 0-33
|
|
|
IKE_SA_INIT 34
|
|
|
IKE_AUTH 35
|
|
|
CREATE_CHILD_SA 36
|
|
|
INFORMATIONAL 37
|
|
|
RESERVED TO IANA 38-239
|
|
|
Reserved for private use 240-255
|
|
|
|
|
|
o Flags (1 octet) - Indicates specific options that are set
|
|
|
for the message. Presence of options are indicated by the
|
|
|
appropriate bit in the flags field being set. The bits are
|
|
|
defined LSB first, so bit 0 would be the least significant
|
|
|
bit of the Flags octet. In the description below, a bit
|
|
|
being 'set' means its value is '1', while 'cleared' means
|
|
|
its value is '0'.
|
|
|
|
|
|
-- X(reserved) (bits 0-2) - These bits MUST be cleared
|
|
|
when sending and MUST be ignored on receipt.
|
|
|
|
|
|
-- I(nitiator) (bit 3 of Flags) - This bit MUST be set in
|
|
|
messages sent by the original initiator of the IKE_SA
|
|
|
and MUST be cleared in messages sent by the original
|
|
|
responder. It is used by the recipient to determine
|
|
|
which eight octets of the SPI were generated by the
|
|
|
recipient.
|
|
|
|
|
|
-- V(ersion) (bit 4 of Flags) - This bit indicates that
|
|
|
the transmitter is capable of speaking a higher major
|
|
|
version number of the protocol than the one indicated
|
|
|
in the major version number field. Implementations of
|
|
|
IKEv2 must clear this bit when sending and MUST ignore
|
|
|
it in incoming messages.
|
|
|
|
|
|
-- R(esponse) (bit 5 of Flags) - This bit indicates that
|
|
|
this message is a response to a message containing
|
|
|
the same message ID. This bit MUST be cleared in all
|
|
|
request messages and MUST be set in all responses.
|
|
|
An IKE endpoint MUST NOT generate a response to a
|
|
|
message that is marked as being a response.
|
|
|
|
|
|
-- X(reserved) (bits 6-7 of Flags) - These bits MUST be
|
|
|
cleared when sending and MUST be ignored on receipt.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 43]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
o Message ID (4 octets) - Message identifier used to control
|
|
|
retransmission of lost packets and matching of requests and
|
|
|
responses. It is essential to the security of the protocol
|
|
|
because it is used to prevent message replay attacks.
|
|
|
See sections 2.1 and 2.2.
|
|
|
|
|
|
o Length (4 octets) - Length of total message (header + payloads)
|
|
|
in octets.
|
|
|
|
|
|
3.2. Generic Payload Header
|
|
|
|
|
|
Each IKE payload defined in sections 3.3 through 3.16 begins with a
|
|
|
generic payload header, shown in Figure 5. Figures for each payload
|
|
|
below will include the generic payload header, but for brevity the
|
|
|
description of each field will be omitted.
|
|
|
|
|
|
1 2 3
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
! Next Payload !C! RESERVED ! Payload Length !
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
|
|
Figure 5: Generic Payload Header
|
|
|
|
|
|
The Generic Payload Header fields are defined as follows:
|
|
|
|
|
|
o Next Payload (1 octet) - Identifier for the payload type of the
|
|
|
next payload in the message. If the current payload is the last
|
|
|
in the message, then this field will be 0. This field provides a
|
|
|
"chaining" capability whereby additional payloads can be added to
|
|
|
a message by appending it to the end of the message and setting
|
|
|
the "Next Payload" field of the preceding payload to indicate the
|
|
|
new payload's type. An Encrypted payload, which must always be
|
|
|
the last payload of a message, is an exception. It contains data
|
|
|
structures in the format of additional payloads. In the header of
|
|
|
an Encrypted payload, the Next Payload field is set to the payload
|
|
|
type of the first contained payload (instead of 0).
|
|
|
|
|
|
Payload Type Values
|
|
|
|
|
|
Next Payload Type Notation Value
|
|
|
|
|
|
No Next Payload 0
|
|
|
|
|
|
RESERVED 1-32
|
|
|
Security Association SA 33
|
|
|
Key Exchange KE 34
|
|
|
Identification - Initiator IDi 35
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 44]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
Identification - Responder IDr 36
|
|
|
Certificate CERT 37
|
|
|
Certificate Request CERTREQ 38
|
|
|
Authentication AUTH 39
|
|
|
Nonce Ni, Nr 40
|
|
|
Notify N 41
|
|
|
Delete D 42
|
|
|
Vendor ID V 43
|
|
|
Traffic Selector - Initiator TSi 44
|
|
|
Traffic Selector - Responder TSr 45
|
|
|
Encrypted E 46
|
|
|
Configuration CP 47
|
|
|
Extensible Authentication EAP 48
|
|
|
RESERVED TO IANA 49-127
|
|
|
PRIVATE USE 128-255
|
|
|
|
|
|
Payload type values 1-32 should not be used so that there is no
|
|
|
overlap with the code assignments for IKEv1. Payload type values
|
|
|
49-127 are reserved to IANA for future assignment in IKEv2 (see
|
|
|
section 6). Payload type values 128-255 are for private use among
|
|
|
mutually consenting parties.
|
|
|
|
|
|
o Critical (1 bit) - MUST be set to zero if the sender wants the
|
|
|
recipient to skip this payload if it does not understand the
|
|
|
payload type code in the Next Payload field of the previous
|
|
|
payload. MUST be set to one if the sender wants the recipient to
|
|
|
reject this entire message if it does not understand the payload
|
|
|
type. MUST be ignored by the recipient if the recipient
|
|
|
understands the payload type code. MUST be set to zero for
|
|
|
payload types defined in this document. Note that the critical
|
|
|
bit applies to the current payload rather than the "next" payload
|
|
|
whose type code appears in the first octet. The reasoning behind
|
|
|
not setting the critical bit for payloads defined in this document
|
|
|
is that all implementations MUST understand all payload types
|
|
|
defined in this document and therefore must ignore the Critical
|
|
|
bit's value. Skipped payloads are expected to have valid Next
|
|
|
Payload and Payload Length fields.
|
|
|
|
|
|
o RESERVED (7 bits) - MUST be sent as zero; MUST be ignored on
|
|
|
receipt.
|
|
|
|
|
|
o Payload Length (2 octets) - Length in octets of the current
|
|
|
payload, including the generic payload header.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 45]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
3.3. Security Association Payload
|
|
|
|
|
|
The Security Association Payload, denoted SA in this memo, is used to
|
|
|
negotiate attributes of a security association. Assembly of Security
|
|
|
Association Payloads requires great peace of mind. An SA payload MAY
|
|
|
contain multiple proposals. If there is more than one, they MUST be
|
|
|
ordered from most preferred to least preferred. Each proposal may
|
|
|
contain multiple IPsec protocols (where a protocol is IKE, ESP, or
|
|
|
AH), each protocol MAY contain multiple transforms, and each
|
|
|
transform MAY contain multiple attributes. When parsing an SA, an
|
|
|
implementation MUST check that the total Payload Length is consistent
|
|
|
with the payload's internal lengths and counts. Proposals,
|
|
|
Transforms, and Attributes each have their own variable length
|
|
|
encodings. They are nested such that the Payload Length of an SA
|
|
|
includes the combined contents of the SA, Proposal, Transform, and
|
|
|
Attribute information. The length of a Proposal includes the lengths
|
|
|
of all Transforms and Attributes it contains. The length of a
|
|
|
Transform includes the lengths of all Attributes it contains.
|
|
|
|
|
|
The syntax of Security Associations, Proposals, Transforms, and
|
|
|
Attributes is based on ISAKMP; however, the semantics are somewhat
|
|
|
different. The reason for the complexity and the hierarchy is to
|
|
|
allow for multiple possible combinations of algorithms to be encoded
|
|
|
in a single SA. Sometimes there is a choice of multiple algorithms,
|
|
|
whereas other times there is a combination of algorithms. For
|
|
|
example, an initiator might want to propose using (AH w/MD5 and ESP
|
|
|
w/3DES) OR (ESP w/MD5 and 3DES).
|
|
|
|
|
|
One of the reasons the semantics of the SA payload has changed from
|
|
|
ISAKMP and IKEv1 is to make the encodings more compact in common
|
|
|
cases.
|
|
|
|
|
|
The Proposal structure contains within it a Proposal # and an IPsec
|
|
|
protocol ID. Each structure MUST have the same Proposal # as the
|
|
|
previous one or be one (1) greater. The first Proposal MUST have a
|
|
|
Proposal # of one (1). If two successive structures have the same
|
|
|
Proposal number, it means that the proposal consists of the first
|
|
|
structure AND the second. So a proposal of AH AND ESP would have two
|
|
|
proposal structures, one for AH and one for ESP and both would have
|
|
|
Proposal #1. A proposal of AH OR ESP would have two proposal
|
|
|
structures, one for AH with Proposal #1 and one for ESP with Proposal
|
|
|
#2.
|
|
|
|
|
|
Each Proposal/Protocol structure is followed by one or more transform
|
|
|
structures. The number of different transforms is generally
|
|
|
determined by the Protocol. AH generally has a single transform: an
|
|
|
integrity check algorithm. ESP generally has two: an encryption
|
|
|
algorithm and an integrity check algorithm. IKE generally has four
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 46]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
transforms: a Diffie-Hellman group, an integrity check algorithm, a
|
|
|
prf algorithm, and an encryption algorithm. If an algorithm that
|
|
|
combines encryption and integrity protection is proposed, it MUST be
|
|
|
proposed as an encryption algorithm and an integrity protection
|
|
|
algorithm MUST NOT be proposed. For each Protocol, the set of
|
|
|
permissible transforms is assigned transform ID numbers, which appear
|
|
|
in the header of each transform.
|
|
|
|
|
|
If there are multiple transforms with the same Transform Type, the
|
|
|
proposal is an OR of those transforms. If there are multiple
|
|
|
Transforms with different Transform Types, the proposal is an AND of
|
|
|
the different groups. For example, to propose ESP with (3DES or
|
|
|
IDEA) and (HMAC_MD5 or HMAC_SHA), the ESP proposal would contain two
|
|
|
Transform Type 1 candidates (one for 3DES and one for IDEA) and two
|
|
|
Transform Type 2 candidates (one for HMAC_MD5 and one for HMAC_SHA).
|
|
|
This effectively proposes four combinations of algorithms. If the
|
|
|
initiator wanted to propose only a subset of those, for example (3DES
|
|
|
and HMAC_MD5) or (IDEA and HMAC_SHA), there is no way to encode that
|
|
|
as multiple transforms within a single Proposal. Instead, the
|
|
|
initiator would have to construct two different Proposals, each with
|
|
|
two transforms.
|
|
|
|
|
|
A given transform MAY have one or more Attributes. Attributes are
|
|
|
necessary when the transform can be used in more than one way, as
|
|
|
when an encryption algorithm has a variable key size. The transform
|
|
|
would specify the algorithm and the attribute would specify the key
|
|
|
size. Most transforms do not have attributes. A transform MUST NOT
|
|
|
have multiple attributes of the same type. To propose alternate
|
|
|
values for an attribute (for example, multiple key sizes for the AES
|
|
|
encryption algorithm), and implementation MUST include multiple
|
|
|
Transforms with the same Transform Type each with a single Attribute.
|
|
|
|
|
|
Note that the semantics of Transforms and Attributes are quite
|
|
|
different from those in IKEv1. In IKEv1, a single Transform carried
|
|
|
multiple algorithms for a protocol with one carried in the Transform
|
|
|
and the others carried in the Attributes.
|
|
|
|
|
|
1 2 3
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
! Next Payload !C! RESERVED ! Payload Length !
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
! !
|
|
|
~ <Proposals> ~
|
|
|
! !
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
|
|
Figure 6: Security Association Payload
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 47]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
o Proposals (variable) - One or more proposal substructures.
|
|
|
|
|
|
The payload type for the Security Association Payload is thirty
|
|
|
three (33).
|
|
|
|
|
|
3.3.1. Proposal Substructure
|
|
|
|
|
|
1 2 3
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
! 0 (last) or 2 ! RESERVED ! Proposal Length !
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
! Proposal # ! Protocol ID ! SPI Size !# of Transforms!
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
~ SPI (variable) ~
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
! !
|
|
|
~ <Transforms> ~
|
|
|
! !
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
|
|
Figure 7: Proposal Substructure
|
|
|
|
|
|
o 0 (last) or 2 (more) (1 octet) - Specifies whether this is the
|
|
|
last Proposal Substructure in the SA. This syntax is inherited
|
|
|
from ISAKMP, but is unnecessary because the last Proposal could
|
|
|
be identified from the length of the SA. The value (2)
|
|
|
corresponds to a Payload Type of Proposal in IKEv1, and the
|
|
|
first 4 octets of the Proposal structure are designed to look
|
|
|
somewhat like the header of a Payload.
|
|
|
|
|
|
o RESERVED (1 octet) - MUST be sent as zero; MUST be ignored on
|
|
|
receipt.
|
|
|
|
|
|
o Proposal Length (2 octets) - Length of this proposal, including
|
|
|
all transforms and attributes that follow.
|
|
|
|
|
|
o Proposal # (1 octet) - When a proposal is made, the first
|
|
|
proposal in an SA payload MUST be #1, and subsequent proposals
|
|
|
MUST either be the same as the previous proposal (indicating an
|
|
|
AND of the two proposals) or one more than the previous
|
|
|
proposal (indicating an OR of the two proposals). When a
|
|
|
proposal is accepted, all of the proposal numbers in the SA
|
|
|
payload MUST be the same and MUST match the number on the
|
|
|
proposal sent that was accepted.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 48]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
o Protocol ID (1 octet) - Specifies the IPsec protocol identifier
|
|
|
for the current negotiation. The defined values are:
|
|
|
|
|
|
Protocol Protocol ID
|
|
|
RESERVED 0
|
|
|
IKE 1
|
|
|
AH 2
|
|
|
ESP 3
|
|
|
RESERVED TO IANA 4-200
|
|
|
PRIVATE USE 201-255
|
|
|
|
|
|
o SPI Size (1 octet) - For an initial IKE_SA negotiation, this
|
|
|
field MUST be zero; the SPI is obtained from the outer header.
|
|
|
During subsequent negotiations, it is equal to the size, in
|
|
|
octets, of the SPI of the corresponding protocol (8 for IKE, 4
|
|
|
for ESP and AH).
|
|
|
|
|
|
o # of Transforms (1 octet) - Specifies the number of transforms
|
|
|
in this proposal.
|
|
|
|
|
|
o SPI (variable) - The sending entity's SPI. Even if the SPI Size
|
|
|
is not a multiple of 4 octets, there is no padding applied to
|
|
|
the payload. When the SPI Size field is zero, this field is
|
|
|
not present in the Security Association payload.
|
|
|
|
|
|
o Transforms (variable) - One or more transform substructures.
|
|
|
|
|
|
3.3.2. Transform Substructure
|
|
|
|
|
|
1 2 3
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
! 0 (last) or 3 ! RESERVED ! Transform Length !
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
!Transform Type ! RESERVED ! Transform ID !
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
! !
|
|
|
~ Transform Attributes ~
|
|
|
! !
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
|
|
Figure 8: Transform Substructure
|
|
|
|
|
|
o 0 (last) or 3 (more) (1 octet) - Specifies whether this is the
|
|
|
last Transform Substructure in the Proposal. This syntax is
|
|
|
inherited from ISAKMP, but is unnecessary because the last
|
|
|
Proposal could be identified from the length of the SA. The
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 49]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
value (3) corresponds to a Payload Type of Transform in IKEv1,
|
|
|
and the first 4 octets of the Transform structure are designed
|
|
|
to look somewhat like the header of a Payload.
|
|
|
|
|
|
o RESERVED - MUST be sent as zero; MUST be ignored on receipt.
|
|
|
|
|
|
o Transform Length - The length (in octets) of the Transform
|
|
|
Substructure including Header and Attributes.
|
|
|
|
|
|
o Transform Type (1 octet) - The type of transform being
|
|
|
specified in this transform. Different protocols support
|
|
|
different transform types. For some protocols, some of the
|
|
|
transforms may be optional. If a transform is optional and the
|
|
|
initiator wishes to propose that the transform be omitted, no
|
|
|
transform of the given type is included in the proposal. If
|
|
|
the initiator wishes to make use of the transform optional to
|
|
|
the responder, it includes a transform substructure with
|
|
|
transform ID = 0 as one of the options.
|
|
|
|
|
|
o Transform ID (2 octets) - The specific instance of the
|
|
|
transform type being proposed.
|
|
|
|
|
|
Transform Type Values
|
|
|
|
|
|
Transform Used In
|
|
|
Type
|
|
|
RESERVED 0
|
|
|
Encryption Algorithm (ENCR) 1 (IKE and ESP)
|
|
|
Pseudo-random Function (PRF) 2 (IKE)
|
|
|
Integrity Algorithm (INTEG) 3 (IKE, AH, optional in ESP)
|
|
|
Diffie-Hellman Group (D-H) 4 (IKE, optional in AH & ESP)
|
|
|
Extended Sequence Numbers (ESN) 5 (AH and ESP)
|
|
|
RESERVED TO IANA 6-240
|
|
|
PRIVATE USE 241-255
|
|
|
|
|
|
For Transform Type 1 (Encryption Algorithm), defined Transform IDs
|
|
|
are:
|
|
|
|
|
|
Name Number Defined In
|
|
|
RESERVED 0
|
|
|
ENCR_DES_IV64 1 (RFC1827)
|
|
|
ENCR_DES 2 (RFC2405), [DES]
|
|
|
ENCR_3DES 3 (RFC2451)
|
|
|
ENCR_RC5 4 (RFC2451)
|
|
|
ENCR_IDEA 5 (RFC2451), [IDEA]
|
|
|
ENCR_CAST 6 (RFC2451)
|
|
|
ENCR_BLOWFISH 7 (RFC2451)
|
|
|
ENCR_3IDEA 8 (RFC2451)
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 50]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
ENCR_DES_IV32 9
|
|
|
RESERVED 10
|
|
|
ENCR_NULL 11 (RFC2410)
|
|
|
ENCR_AES_CBC 12 (RFC3602)
|
|
|
ENCR_AES_CTR 13 (RFC3664)
|
|
|
|
|
|
values 14-1023 are reserved to IANA. Values 1024-65535 are
|
|
|
for private use among mutually consenting parties.
|
|
|
|
|
|
For Transform Type 2 (Pseudo-random Function), defined Transform IDs
|
|
|
are:
|
|
|
|
|
|
Name Number Defined In
|
|
|
RESERVED 0
|
|
|
PRF_HMAC_MD5 1 (RFC2104), [MD5]
|
|
|
PRF_HMAC_SHA1 2 (RFC2104), [SHA]
|
|
|
PRF_HMAC_TIGER 3 (RFC2104)
|
|
|
PRF_AES128_XCBC 4 (RFC3664)
|
|
|
|
|
|
values 5-1023 are reserved to IANA. Values 1024-65535 are for
|
|
|
private use among mutually consenting parties.
|
|
|
|
|
|
For Transform Type 3 (Integrity Algorithm), defined Transform IDs
|
|
|
are:
|
|
|
|
|
|
Name Number Defined In
|
|
|
NONE 0
|
|
|
AUTH_HMAC_MD5_96 1 (RFC2403)
|
|
|
AUTH_HMAC_SHA1_96 2 (RFC2404)
|
|
|
AUTH_DES_MAC 3
|
|
|
AUTH_KPDK_MD5 4 (RFC1826)
|
|
|
AUTH_AES_XCBC_96 5 (RFC3566)
|
|
|
|
|
|
values 6-1023 are reserved to IANA. Values 1024-65535 are for
|
|
|
private use among mutually consenting parties.
|
|
|
|
|
|
For Transform Type 4 (Diffie-Hellman Group), defined Transform IDs
|
|
|
are:
|
|
|
|
|
|
Name Number
|
|
|
NONE 0
|
|
|
Defined in Appendix B 1 - 2
|
|
|
RESERVED 3 - 4
|
|
|
Defined in [ADDGROUP] 5
|
|
|
RESERVED TO IANA 6 - 13
|
|
|
Defined in [ADDGROUP] 14 - 18
|
|
|
RESERVED TO IANA 19 - 1023
|
|
|
PRIVATE USE 1024-65535
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 51]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
For Transform Type 5 (Extended Sequence Numbers), defined Transform
|
|
|
IDs are:
|
|
|
|
|
|
Name Number
|
|
|
No Extended Sequence Numbers 0
|
|
|
Extended Sequence Numbers 1
|
|
|
RESERVED 2 - 65535
|
|
|
|
|
|
3.3.3. Valid Transform Types by Protocol
|
|
|
|
|
|
The number and type of transforms that accompany an SA payload are
|
|
|
dependent on the protocol in the SA itself. An SA payload proposing
|
|
|
the establishment of an SA has the following mandatory and optional
|
|
|
transform types. A compliant implementation MUST understand all
|
|
|
mandatory and optional types for each protocol it supports (though it
|
|
|
need not accept proposals with unacceptable suites). A proposal MAY
|
|
|
omit the optional types if the only value for them it will accept is
|
|
|
NONE.
|
|
|
|
|
|
Protocol Mandatory Types Optional Types
|
|
|
IKE ENCR, PRF, INTEG, D-H
|
|
|
ESP ENCR, ESN INTEG, D-H
|
|
|
AH INTEG, ESN D-H
|
|
|
|
|
|
3.3.4. Mandatory Transform IDs
|
|
|
|
|
|
The specification of suites that MUST and SHOULD be supported for
|
|
|
interoperability has been removed from this document because they are
|
|
|
likely to change more rapidly than this document evolves.
|
|
|
|
|
|
An important lesson learned from IKEv1 is that no system should only
|
|
|
implement the mandatory algorithms and expect them to be the best
|
|
|
choice for all customers. For example, at the time that this
|
|
|
document was written, many IKEv1 implementers were starting to
|
|
|
migrate to AES in Cipher Block Chaining (CBC) mode for Virtual
|
|
|
Private Network (VPN) applications. Many IPsec systems based on
|
|
|
IKEv2 will implement AES, additional Diffie-Hellman groups, and
|
|
|
additional hash algorithms, and some IPsec customers already require
|
|
|
these algorithms in addition to the ones listed above.
|
|
|
|
|
|
It is likely that IANA will add additional transforms in the future,
|
|
|
and some users may want to use private suites, especially for IKE
|
|
|
where implementations should be capable of supporting different
|
|
|
parameters, up to certain size limits. In support of this goal, all
|
|
|
implementations of IKEv2 SHOULD include a management facility that
|
|
|
allows specification (by a user or system administrator) of Diffie-
|
|
|
Hellman (DH) parameters (the generator, modulus, and exponent lengths
|
|
|
and values) for new DH groups. Implementations SHOULD provide a
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 52]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
management interface via which these parameters and the associated
|
|
|
transform IDs may be entered (by a user or system administrator), to
|
|
|
enable negotiating such groups.
|
|
|
|
|
|
All implementations of IKEv2 MUST include a management facility that
|
|
|
enables a user or system administrator to specify the suites that are
|
|
|
acceptable for use with IKE. Upon receipt of a payload with a set of
|
|
|
transform IDs, the implementation MUST compare the transmitted
|
|
|
transform IDs against those locally configured via the management
|
|
|
controls, to verify that the proposed suite is acceptable based on
|
|
|
local policy. The implementation MUST reject SA proposals that are
|
|
|
not authorized by these IKE suite controls. Note that cryptographic
|
|
|
suites that MUST be implemented need not be configured as acceptable
|
|
|
to local policy.
|
|
|
|
|
|
3.3.5. Transform Attributes
|
|
|
|
|
|
Each transform in a Security Association payload may include
|
|
|
attributes that modify or complete the specification of the
|
|
|
transform. These attributes are type/value pairs and are defined
|
|
|
below. For example, if an encryption algorithm has a variable-length
|
|
|
key, the key length to be used may be specified as an attribute.
|
|
|
Attributes can have a value with a fixed two octet length or a
|
|
|
variable-length value. For the latter, the attribute is encoded as
|
|
|
type/length/value.
|
|
|
|
|
|
1 2 3
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
!A! Attribute Type ! AF=0 Attribute Length !
|
|
|
!F! ! AF=1 Attribute Value !
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
! AF=0 Attribute Value !
|
|
|
! AF=1 Not Transmitted !
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
|
|
Figure 9: Data Attributes
|
|
|
|
|
|
o Attribute Type (2 octets) - Unique identifier for each type of
|
|
|
attribute (see below).
|
|
|
|
|
|
The most significant bit of this field is the Attribute Format
|
|
|
bit (AF). It indicates whether the data attributes follow the
|
|
|
Type/Length/Value (TLV) format or a shortened Type/Value (TV)
|
|
|
format. If the AF bit is zero (0), then the Data Attributes
|
|
|
are of the Type/Length/Value (TLV) form. If the AF bit is a
|
|
|
one (1), then the Data Attributes are of the Type/Value form.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 53]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
o Attribute Length (2 octets) - Length in octets of the Attribute
|
|
|
Value. When the AF bit is a one (1), the Attribute Value is
|
|
|
only 2 octets and the Attribute Length field is not present.
|
|
|
|
|
|
o Attribute Value (variable length) - Value of the Attribute
|
|
|
associated with the Attribute Type. If the AF bit is a zero
|
|
|
(0), this field has a variable length defined by the Attribute
|
|
|
Length field. If the AF bit is a one (1), the Attribute Value
|
|
|
has a length of 2 octets.
|
|
|
|
|
|
Note that only a single attribute type (Key Length) is defined, and
|
|
|
it is fixed length. The variable-length encoding specification is
|
|
|
included only for future extensions. The only algorithms defined in
|
|
|
this document that accept attributes are the AES-based encryption,
|
|
|
integrity, and pseudo-random functions, which require a single
|
|
|
attribute specifying key width.
|
|
|
|
|
|
Attributes described as basic MUST NOT be encoded using the
|
|
|
variable-length encoding. Variable-length attributes MUST NOT be
|
|
|
encoded as basic even if their value can fit into two octets. NOTE:
|
|
|
This is a change from IKEv1, where increased flexibility may have
|
|
|
simplified the composer of messages but certainly complicated the
|
|
|
parser.
|
|
|
|
|
|
Attribute Type Value Attribute Format
|
|
|
--------------------------------------------------------------
|
|
|
RESERVED 0-13 Key Length (in bits)
|
|
|
14 TV RESERVED 15-17
|
|
|
RESERVED TO IANA 18-16383 PRIVATE USE
|
|
|
16384-32767
|
|
|
|
|
|
Values 0-13 and 15-17 were used in a similar context in IKEv1 and
|
|
|
should not be assigned except to matching values. Values 18-16383
|
|
|
are reserved to IANA. Values 16384-32767 are for private use among
|
|
|
mutually consenting parties.
|
|
|
|
|
|
- Key Length
|
|
|
|
|
|
When using an Encryption Algorithm that has a variable-length key,
|
|
|
this attribute specifies the key length in bits (MUST use network
|
|
|
byte order). This attribute MUST NOT be used when the specified
|
|
|
Encryption Algorithm uses a fixed-length key.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 54]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
3.3.6. Attribute Negotiation
|
|
|
|
|
|
During security association negotiation, initiators present offers to
|
|
|
responders. Responders MUST select a single complete set of
|
|
|
parameters from the offers (or reject all offers if none are
|
|
|
acceptable). If there are multiple proposals, the responder MUST
|
|
|
choose a single proposal number and return all of the Proposal
|
|
|
substructures with that Proposal number. If there are multiple
|
|
|
Transforms with the same type, the responder MUST choose a single
|
|
|
one. Any attributes of a selected transform MUST be returned
|
|
|
unmodified. The initiator of an exchange MUST check that the
|
|
|
accepted offer is consistent with one of its proposals, and if not
|
|
|
that response MUST be rejected.
|
|
|
|
|
|
Negotiating Diffie-Hellman groups presents some special challenges.
|
|
|
SA offers include proposed attributes and a Diffie-Hellman public
|
|
|
number (KE) in the same message. If in the initial exchange the
|
|
|
initiator offers to use one of several Diffie-Hellman groups, it
|
|
|
SHOULD pick the one the responder is most likely to accept and
|
|
|
include a KE corresponding to that group. If the guess turns out to
|
|
|
be wrong, the responder will indicate the correct group in the
|
|
|
response and the initiator SHOULD pick an element of that group for
|
|
|
its KE value when retrying the first message. It SHOULD, however,
|
|
|
continue to propose its full supported set of groups in order to
|
|
|
prevent a man-in-the-middle downgrade attack.
|
|
|
|
|
|
Implementation Note:
|
|
|
|
|
|
Certain negotiable attributes can have ranges or could have
|
|
|
multiple acceptable values. These include the key length of a
|
|
|
variable key length symmetric cipher. To further interoperability
|
|
|
and to support upgrading endpoints independently, implementers of
|
|
|
this protocol SHOULD accept values that they deem to supply
|
|
|
greater security. For instance, if a peer is configured to accept
|
|
|
a variable-length cipher with a key length of X bits and is
|
|
|
offered that cipher with a larger key length, the implementation
|
|
|
SHOULD accept the offer if it supports use of the longer key.
|
|
|
|
|
|
Support of this capability allows an implementation to express a
|
|
|
concept of "at least" a certain level of security -- "a key length of
|
|
|
_at least_ X bits for cipher Y".
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kaufman Standards Track [Page 55]
|
|
|
|
|
|
RFC 4306 IKEv2 December 2005
|
|
|
|
|
|
|
|
|
3.4. Key Exchange Payload
|
|
|
|
|
|
The Key Exchange Payload, denoted KE in this memo, is used to
|
|
|
exchange Diffie-Hellman public numbers as part of a Diffie-Hellman
|
|
|
key exchange. The Key Exchange Payload consists of the IKE generic
|
|
|
payload header followed by the Diffie-Hellman public value itself.
|
|
|
|
|
|
1 2 3
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|