| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251 | 
							
- Network Working Group                                          P. Eronen
 
- Request for Comments: 4718                                         Nokia
 
- Category: Informational                                       P. Hoffman
 
-                                                           VPN Consortium
 
-                                                             October 2006
 
-            IKEv2 Clarifications and Implementation Guidelines
 
- Status of This Memo
 
-    This memo provides information for the Internet community.  It does
 
-    not specify an Internet standard of any kind.  Distribution of this
 
-    memo is unlimited.
 
- Copyright Notice
 
-    Copyright (C) The Internet Society (2006).
 
- Abstract
 
-    This document clarifies many areas of the IKEv2 specification.  It
 
-    does not to introduce any changes to the protocol, but rather
 
-    provides descriptions that are less prone to ambiguous
 
-    interpretations.  The purpose of this document is to encourage the
 
-    development of interoperable implementations.
 
- Eronen & Hoffman             Informational                      [Page 1]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
- Table of Contents
 
-    1. Introduction ....................................................4
 
-    2. Creating the IKE_SA .............................................4
 
-       2.1. SPI Values in IKE_SA_INIT Exchange .........................4
 
-       2.2. Message IDs for IKE_SA_INIT Messages .......................5
 
-       2.3. Retransmissions of IKE_SA_INIT Requests ....................5
 
-       2.4. Interaction of COOKIE and INVALID_KE_PAYLOAD ...............6
 
-       2.5. Invalid Cookies ............................................8
 
-    3. Authentication ..................................................9
 
-       3.1. Data Included in AUTH Payload Calculation ..................9
 
-       3.2. Hash Function for RSA Signatures ...........................9
 
-       3.3. Encoding Method for RSA Signatures ........................10
 
-       3.4. Identification Type for EAP ...............................11
 
-       3.5. Identity for Policy Lookups When Using EAP ................11
 
-       3.6. Certificate Encoding Types ................................12
 
-       3.7. Shared Key Authentication and Fixed PRF Key Size ..........12
 
-       3.8. EAP Authentication and Fixed PRF Key Size .................13
 
-       3.9. Matching ID Payloads to Certificate Contents ..............13
 
-       3.10. Message IDs for IKE_AUTH Messages ........................14
 
-    4. Creating CHILD_SAs .............................................14
 
-       4.1. Creating SAs with the CREATE_CHILD_SA Exchange ............14
 
-       4.2. Creating an IKE_SA without a CHILD_SA .....................16
 
-       4.3. Diffie-Hellman for First CHILD_SA .........................16
 
-       4.4. Extended Sequence Numbers (ESN) Transform .................17
 
-       4.5. Negotiation of ESP_TFC_PADDING_NOT_SUPPORTED ..............17
 
-       4.6. Negotiation of NON_FIRST_FRAGMENTS_ALSO ...................18
 
-       4.7. Semantics of Complex Traffic Selector Payloads ............18
 
-       4.8. ICMP Type/Code in Traffic Selector Payloads ...............19
 
-       4.9. Mobility Header in Traffic Selector Payloads ..............20
 
-       4.10. Narrowing the Traffic Selectors ..........................20
 
-       4.11. SINGLE_PAIR_REQUIRED .....................................21
 
-       4.12. Traffic Selectors Violating Own Policy ...................21
 
-       4.13. Traffic Selector Authorization ...........................22
 
-    5. Rekeying and Deleting SAs ......................................23
 
-       5.1. Rekeying SAs with the CREATE_CHILD_SA Exchange ............23
 
-       5.2. Rekeying the IKE_SA vs. Reauthentication ..................24
 
-       5.3. SPIs When Rekeying the IKE_SA .............................25
 
-       5.4. SPI When Rekeying a CHILD_SA ..............................25
 
-       5.5. Changing PRFs When Rekeying the IKE_SA ....................26
 
-       5.6. Deleting vs. Closing SAs ..................................26
 
-       5.7. Deleting a CHILD_SA Pair ..................................26
 
-       5.8. Deleting an IKE_SA ........................................27
 
-       5.9. Who is the original initiator of IKE_SA ...................27
 
-       5.10. Comparing Nonces .........................................27
 
-       5.11. Exchange Collisions ......................................28
 
-       5.12. Diffie-Hellman and Rekeying the IKE_SA ...................36
 
- Eronen & Hoffman             Informational                      [Page 2]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    6. Configuration Payloads .........................................37
 
-       6.1. Assigning IP Addresses ....................................37
 
-       6.2. Requesting any INTERNAL_IP4/IP6_ADDRESS ...................38
 
-       6.3. INTERNAL_IP4_SUBNET/INTERNAL_IP6_SUBNET ...................38
 
-       6.4. INTERNAL_IP4_NETMASK ......................................41
 
-       6.5. Configuration Payloads for IPv6 ...........................42
 
-       6.6. INTERNAL_IP6_NBNS .........................................43
 
-       6.7. INTERNAL_ADDRESS_EXPIRY ...................................43
 
-       6.8. Address Assignment Failures ...............................44
 
-    7. Miscellaneous Issues ...........................................45
 
-       7.1. Matching ID_IPV4_ADDR and ID_IPV6_ADDR ....................45
 
-       7.2. Relationship of IKEv2 to RFC 4301 .........................45
 
-       7.3. Reducing the Window Size ..................................46
 
-       7.4. Minimum Size of Nonces ....................................46
 
-       7.5. Initial Zero Octets on Port 4500 ..........................46
 
-       7.6. Destination Port for NAT Traversal ........................47
 
-       7.7. SPI Values for Messages outside an IKE_SA .................47
 
-       7.8. Protocol ID/SPI Fields in Notify Payloads .................48
 
-       7.9. Which message should contain INITIAL_CONTACT ..............48
 
-       7.10. Alignment of Payloads ....................................48
 
-       7.11. Key Length Transform Attribute ...........................48
 
-       7.12. IPsec IANA Considerations ................................49
 
-       7.13. Combining ESP and AH .....................................50
 
-    8. Implementation Mistakes ........................................50
 
-    9. Security Considerations ........................................51
 
-    10. Acknowledgments ...............................................51
 
-    11. References ....................................................51
 
-       11.1. Normative References .....................................51
 
-       11.2. Informative References ...................................52
 
-    Appendix A. Exchanges and Payloads ................................54
 
-       A.1. IKE_SA_INIT Exchange ......................................54
 
-       A.2. IKE_AUTH Exchange without EAP .............................54
 
-       A.3. IKE_AUTH Exchange with EAP ................................55
 
-       A.4. CREATE_CHILD_SA Exchange for Creating/Rekeying
 
-            CHILD_SAs .................................................56
 
-       A.5. CREATE_CHILD_SA Exchange for Rekeying the IKE_SA ..........56
 
-       A.6. INFORMATIONAL Exchange ....................................56
 
- Eronen & Hoffman             Informational                      [Page 3]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
- 1.  Introduction
 
-    This document clarifies many areas of the IKEv2 specification that
 
-    may be difficult to understand to developers not intimately familiar
 
-    with the specification and its history.  The clarifications in this
 
-    document come from the discussion on the IPsec WG mailing list, from
 
-    experience in interoperability testing, and from implementation
 
-    issues that have been brought to the editors' attention.
 
-    IKEv2/IPsec can be used for several different purposes, including
 
-    IPsec-based remote access (sometimes called the "road warrior" case),
 
-    site-to-site virtual private networks (VPNs), and host-to-host
 
-    protection of application traffic.  While this document attempts to
 
-    consider all of these uses, the remote access scenario has perhaps
 
-    received more attention here than the other uses.
 
-    This document does not place any requirements on anyone and does not
 
-    use [RFC2119] keywords such as "MUST" and "SHOULD", except in
 
-    quotations from the original IKEv2 documents.  The requirements are
 
-    given in the IKEv2 specification [IKEv2] and IKEv2 cryptographic
 
-    algorithms document [IKEv2ALG].
 
-    In this document, references to a numbered section (such as "Section
 
-    2.15") mean that section in [IKEv2].  References to mailing list
 
-    messages or threads refer to the IPsec WG mailing list at
 
-    ipsec@ietf.org.  Archives of the mailing list can be found at
 
-    <http://www.ietf.org/mail-archive/web/ipsec/index.html>.
 
- 2.  Creating the IKE_SA
 
- 2.1.  SPI Values in IKE_SA_INIT Exchange
 
-    Normal IKE messages include the initiator's and responder's Security
 
-    Parameter Indexes (SPIs), both of which are non-zero, in the IKE
 
-    header.  However, there are some corner cases where the IKEv2
 
-    specification is not fully consistent about what values should be
 
-    used.
 
-    First, Section 3.1 says that the Responder's SPI "...MUST NOT be zero
 
-    in any other message" (than the first message of the IKE_SA_INIT
 
-    exchange).  However, the figure in Section 2.6 shows the second
 
-    IKE_SA_INIT message as "HDR(A,0), N(COOKIE)", contradicting the text
 
-    in 3.1.
 
-    Since the responder's SPI identifies security-related state held by
 
-    the responder, and in this case no state is created, sending a zero
 
-    value seems reasonable.
 
- Eronen & Hoffman             Informational                      [Page 4]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    Second, in addition to cookies, there are several other cases when
 
-    the IKE_SA_INIT exchange does not result in the creation of an IKE_SA
 
-    (for instance, INVALID_KE_PAYLOAD or NO_PROPOSAL_CHOSEN).  What
 
-    responder SPI value should be used in the IKE_SA_INIT response in
 
-    this case?
 
-    Since the IKE_SA_INIT request always has a zero responder SPI, the
 
-    value will not be actually used by the initiator.  Thus, we think
 
-    sending a zero value is correct also in this case.
 
-    If the responder sends a non-zero responder SPI, the initiator should
 
-    not reject the response only for that reason.  However, when retrying
 
-    the IKE_SA_INIT request, the initiator will use a zero responder SPI,
 
-    as described in Section 3.1: "Responder's SPI [...]  This value MUST
 
-    be zero in the first message of an IKE Initial Exchange (including
 
-    repeats of that message including a cookie) [...]".  We believe the
 
-    intent was to cover repeats of that message due to other reasons,
 
-    such as INVALID_KE_PAYLOAD, as well.
 
-    (References: "INVALID_KE_PAYLOAD and clarifications document" thread,
 
-    Sep-Oct 2005.)
 
- 2.2.  Message IDs for IKE_SA_INIT Messages
 
-    The Message ID for IKE_SA_INIT messages is always zero.  This
 
-    includes retries of the message due to responses such as COOKIE and
 
-    INVALID_KE_PAYLOAD.
 
-    This is because Message IDs are part of the IKE_SA state, and when
 
-    the responder replies to IKE_SA_INIT request with N(COOKIE) or
 
-    N(INVALID_KE_PAYLOAD), the responder does not allocate any state.
 
-    (References: "Question about N(COOKIE) and N(INVALID_KE_PAYLOAD)
 
-    combination" thread, Oct 2004.  Tero Kivinen's mail "Comments of
 
-    draft-eronen-ipsec-ikev2-clarifications-02.txt", 2005-04-05.)
 
- 2.3.  Retransmissions of IKE_SA_INIT Requests
 
-    When a responder receives an IKE_SA_INIT request, it has to determine
 
-    whether the packet is a retransmission belonging to an existing
 
-    "half-open" IKE_SA (in which case the responder retransmits the same
 
-    response), or a new request (in which case the responder creates a
 
-    new IKE_SA and sends a fresh response).
 
-    The specification does not describe in detail how this determination
 
-    is done.  In particular, it is not sufficient to use the initiator's
 
-    SPI and/or IP address for this purpose: two different peers behind a
 
-    single NAT could choose the same initiator SPI (and the probability
 
- Eronen & Hoffman             Informational                      [Page 5]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    of this happening is not necessarily small, since IKEv2 does not
 
-    require SPIs to be chosen randomly).  Instead, the responder should
 
-    do the IKE_SA lookup using the whole packet or its hash (or at the
 
-    minimum, the Ni payload which is always chosen randomly).
 
-    For all other packets than IKE_SA_INIT requests, looking up right
 
-    IKE_SA is of course done based on the recipient's SPI (either the
 
-    initiator or responder SPI depending on the value of the Initiator
 
-    bit in the IKE header).
 
- 2.4.  Interaction of COOKIE and INVALID_KE_PAYLOAD
 
-    There are two common reasons why the initiator may have to retry the
 
-    IKE_SA_INIT exchange: the responder requests a cookie or wants a
 
-    different Diffie-Hellman group than was included in the KEi payload.
 
-    Both of these cases are quite simple alone, but it is not totally
 
-    obvious what happens when they occur at the same time, that is, the
 
-    IKE_SA_INIT exchange is retried several times.
 
-    The main question seems to be the following: if the initiator
 
-    receives a cookie from the responder, should it include the cookie in
 
-    only the next retry of the IKE_SA_INIT request, or in all subsequent
 
-    retries as well?  Section 3.10.1 says that:
 
-       "This notification MUST be included in an IKE_SA_INIT request
 
-       retry if a COOKIE notification was included in the initial
 
-       response."
 
-    This could be interpreted as saying that when a cookie is received in
 
-    the initial response, it is included in all retries.  On the other
 
-    hand, Section 2.6 says that:
 
-       "Initiators who receive such responses MUST retry the
 
-       IKE_SA_INIT with a Notify payload of type COOKIE containing
 
-       the responder supplied cookie data as the first payload and
 
-       all other payloads unchanged."
 
-    Including the same cookie in later retries makes sense only if the
 
-    "all other payloads unchanged" restriction applies only to the first
 
-    retry, but not to subsequent retries.
 
-    It seems that both interpretations can peacefully coexist.  If the
 
-    initiator includes the cookie only in the next retry, one additional
 
-    roundtrip may be needed in some cases:
 
- Eronen & Hoffman             Informational                      [Page 6]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-       Initiator                   Responder
 
-      -----------                 -----------
 
-       HDR(A,0), SAi1, KEi, Ni -->
 
-                               <-- HDR(A,0), N(COOKIE)
 
-       HDR(A,0), N(COOKIE), SAi1, KEi, Ni  -->
 
-                               <-- HDR(A,0), N(INVALID_KE_PAYLOAD)
 
-       HDR(A,0), SAi1, KEi', Ni -->
 
-                               <-- HDR(A,0), N(COOKIE')
 
-       HDR(A,0), N(COOKIE'), SAi1, KEi',Ni -->
 
-                               <-- HDR(A,B), SAr1, KEr, Nr
 
-    An additional roundtrip is needed also if the initiator includes the
 
-    cookie in all retries, but the responder does not support this
 
-    functionality.  For instance, if the responder includes the SAi1 and
 
-    KEi payloads in cookie calculation, it will reject the request by
 
-    sending a new cookie (see also Section 2.5 of this document for more
 
-    text about invalid cookies):
 
-       Initiator                   Responder
 
-      -----------                 -----------
 
-       HDR(A,0), SAi1, KEi, Ni -->
 
-                               <-- HDR(A,0), N(COOKIE)
 
-       HDR(A,0), N(COOKIE), SAi1, KEi, Ni  -->
 
-                               <-- HDR(A,0), N(INVALID_KE_PAYLOAD)
 
-       HDR(A,0), N(COOKIE), SAi1, KEi', Ni -->
 
-                               <-- HDR(A,0), N(COOKIE')
 
-       HDR(A,0), N(COOKIE'), SAi1, KEi',Ni -->
 
-                               <-- HDR(A,B), SAr1, KEr, Nr
 
-    If both peers support including the cookie in all retries, a slightly
 
-    shorter exchange can happen:
 
-       Initiator                   Responder
 
-      -----------                 -----------
 
-       HDR(A,0), SAi1, KEi, Ni -->
 
-                               <-- HDR(A,0), N(COOKIE)
 
-       HDR(A,0), N(COOKIE), SAi1, KEi, Ni  -->
 
-                               <-- HDR(A,0), N(INVALID_KE_PAYLOAD)
 
-       HDR(A,0), N(COOKIE), SAi1, KEi', Ni -->
 
-                               <-- HDR(A,B), SAr1, KEr, Nr
 
-    This document recommends that implementations should support this
 
-    shorter exchange, but it must not be assumed the other peer also
 
-    supports the shorter exchange.
 
- Eronen & Hoffman             Informational                      [Page 7]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    In theory, even this exchange has one unnecessary roundtrip, as both
 
-    the cookie and Diffie-Hellman group could be checked at the same
 
-    time:
 
-       Initiator                   Responder
 
-      -----------                 -----------
 
-       HDR(A,0), SAi1, KEi, Ni -->
 
-                               <-- HDR(A,0), N(COOKIE),
 
-                                             N(INVALID_KE_PAYLOAD)
 
-       HDR(A,0), N(COOKIE), SAi1, KEi',Ni -->
 
-                               <-- HDR(A,B), SAr1, KEr, Nr
 
-    However, it is clear that this case is not allowed by the text in
 
-    Section 2.6, since "all other payloads" clearly includes the KEi
 
-    payload as well.
 
-    (References: "INVALID_KE_PAYLOAD and clarifications document" thread,
 
-    Sep-Oct 2005.)
 
- 2.5.  Invalid Cookies
 
-    There has been some confusion what should be done when an IKE_SA_INIT
 
-    request containing an invalid cookie is received ("invalid" in the
 
-    sense that its contents do not match the value expected by the
 
-    responder).
 
-    The correct action is to ignore the cookie and process the message as
 
-    if no cookie had been included (usually this means sending a response
 
-    containing a new cookie).  This is shown in Section 2.6 when it says
 
-    "The responder in that case MAY reject the message by sending another
 
-    response with a new cookie [...]".
 
-    Other possible actions, such as ignoring the whole request (or even
 
-    all requests from this IP address for some time), create strange
 
-    failure modes even in the absence of any malicious attackers and do
 
-    not provide any additional protection against DoS attacks.
 
-    (References: "Invalid Cookie" thread, Sep-Oct 2005.)
 
- Eronen & Hoffman             Informational                      [Page 8]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
- 3.  Authentication
 
- 3.1.  Data Included in AUTH Payload Calculation
 
-    Section 2.15 describes how the AUTH payloads are calculated; this
 
-    calculation involves values prf(SK_pi,IDi') and prf(SK_pr,IDr').  The
 
-    text describes the method in words, but does not give clear
 
-    definitions of what is signed or MACed (i.e., protected with a
 
-    message authentication code).
 
-    The initiator's signed octets can be described as:
 
-        InitiatorSignedOctets = RealMessage1 | NonceRData | MACedIDForI
 
-        GenIKEHDR = [ four octets 0 if using port 4500 ] | RealIKEHDR
 
-        RealIKEHDR =  SPIi | SPIr |  . . . | Length
 
-        RealMessage1 = RealIKEHDR | RestOfMessage1
 
-        NonceRPayload = PayloadHeader | NonceRData
 
-        InitiatorIDPayload = PayloadHeader | RestOfIDPayload
 
-        RestOfInitIDPayload = IDType | RESERVED | InitIDData
 
-        MACedIDForI = prf(SK_pi, RestOfInitIDPayload)
 
-    The responder's signed octets can be described as:
 
-        ResponderSignedOctets = RealMessage2 | NonceIData | MACedIDForR
 
-        GenIKEHDR = [ four octets 0 if using port 4500 ] | RealIKEHDR
 
-        RealIKEHDR =  SPIi | SPIr |  . . . | Length
 
-        RealMessage2 = RealIKEHDR | RestOfMessage2
 
-        NonceIPayload = PayloadHeader | NonceIData
 
-        ResponderIDPayload = PayloadHeader | RestOfIDPayload
 
-        RestOfRespIDPayload = IDType | RESERVED | InitIDData
 
-        MACedIDForR = prf(SK_pr, RestOfRespIDPayload)
 
- 3.2.  Hash Function for RSA Signatures
 
-    Section 3.8 says that RSA digital signature is "Computed as specified
 
-    in section 2.15 using an RSA private key over a PKCS#1 padded hash."
 
-    Unlike IKEv1, IKEv2 does not negotiate a hash function for the
 
-    IKE_SA.  The algorithm for signatures is selected by the signing
 
-    party who, in general, may not know beforehand what algorithms the
 
-    verifying party supports.  Furthermore, [IKEv2ALG] does not say what
 
-    algorithms implementations are required or recommended to support.
 
-    This clearly has a potential for causing interoperability problems,
 
-    since authentication will fail if the signing party selects an
 
-    algorithm that is not supported by the verifying party, or not
 
-    acceptable according to the verifying party's policy.
 
- Eronen & Hoffman             Informational                      [Page 9]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    This document recommends that all implementations support SHA-1 and
 
-    use SHA-1 as the default hash function when generating the
 
-    signatures, unless there are good reasons (such as explicit manual
 
-    configuration) to believe that the peer supports something else.
 
-    Note that hash function collision attacks are not important for the
 
-    AUTH payloads, since they are not intended for third-party
 
-    verification, and the data includes fresh nonces.  See [HashUse] for
 
-    more discussion about hash function attacks and IPsec.
 
-    Another reasonable choice would be to use the hash function that was
 
-    used by the CA when signing the peer certificate.  However, this does
 
-    not guarantee that the IKEv2 peer would be able to validate the AUTH
 
-    payload, because the same code might not be used to validate
 
-    certificate signatures and IKEv2 message signatures, and these two
 
-    routines may support a different set of hash algorithms.  The peer
 
-    could be configured with a fingerprint of the certificate, or
 
-    certificate validation could be performed by an external entity using
 
-    [SCVP].  Furthermore, not all CERT payloads types include a
 
-    signature, and the certificate could be signed with some algorithm
 
-    other than RSA.
 
-    Note that unlike IKEv1, IKEv2 uses the PKCS#1 v1.5 [PKCS1v20]
 
-    signature encoding method (see next section for details), which
 
-    includes the algorithm identifier for the hash algorithm.  Thus, when
 
-    the verifying party receives the AUTH payload it can at least
 
-    determine which hash function was used.
 
-    (References: Magnus Alstrom's mail "RE:", 2005-01-03.  Pasi Eronen's
 
-    reply, 2005-01-04.  Tero Kivinen's reply, 2005-01-04.  "First draft
 
-    of IKEv2.1" thread, Dec 2005/Jan 2006.)
 
- 3.3.  Encoding Method for RSA Signatures
 
-    Section 3.8 says that the RSA digital signature is "Computed as
 
-    specified in section 2.15 using an RSA private key over a PKCS#1
 
-    padded hash."
 
-    The PKCS#1 specification [PKCS1v21] defines two different encoding
 
-    methods (ways of "padding the hash") for signatures.  However, the
 
-    Internet-Draft approved by the IESG had a reference to the older
 
-    PKCS#1 v2.0 [PKCS1v20].  That version has only one encoding method
 
-    for signatures (EMSA-PKCS1-v1_5), and thus there is no ambiguity.
 
- Eronen & Hoffman             Informational                     [Page 10]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    Note that this encoding method is different from the encoding method
 
-    used in IKEv1.  If future revisions of IKEv2 provide support for
 
-    other encoding methods (such as EMSA-PSS), they will be given new
 
-    Auth Method numbers.
 
-    (References: Pasi Eronen's mail "RE:", 2005-01-04.)
 
- 3.4.  Identification Type for EAP
 
-    Section 3.5 defines several different types for identification
 
-    payloads, including, e.g., ID_FQDN, ID_RFC822_ADDR, and ID_KEY_ID.
 
-    EAP [EAP] does not mandate the use of any particular type of
 
-    identifier, but often EAP is used with Network Access Identifiers
 
-    (NAIs) defined in [NAI].  Although NAIs look a bit like email
 
-    addresses (e.g., "joe@example.com"), the syntax is not exactly the
 
-    same as the syntax of email address in [RFC822].  This raises the
 
-    question of which identification type should be used.
 
-    This document recommends that ID_RFC822_ADDR identification type is
 
-    used for those NAIs that include the realm component.  Therefore,
 
-    responder implementations should not attempt to verify that the
 
-    contents actually conform to the exact syntax given in [RFC822] or
 
-    [RFC2822], but instead should accept any reasonable looking NAI.
 
-    For NAIs that do not include the realm component, this document
 
-    recommends using the ID_KEY_ID identification type.
 
-    (References: "need your help on this IKEv2/i18n/EAP issue" and "IKEv2
 
-    identifier issue with EAP" threads, Aug 2004.)
 
- 3.5.  Identity for Policy Lookups When Using EAP
 
-    When the initiator authentication uses EAP, it is possible that the
 
-    contents of the IDi payload is used only for AAA routing purposes and
 
-    selecting which EAP method to use.  This value may be different from
 
-    the identity authenticated by the EAP method (see [EAP], Sections 5.1
 
-    and 7.3).
 
-    It is important that policy lookups and access control decisions use
 
-    the actual authenticated identity.  Often the EAP server is
 
-    implemented in a separate AAA server that communicates with the IKEv2
 
-    responder using, e.g., RADIUS [RADEAP].  In this case, the
 
-    authenticated identity has to be sent from the AAA server to the
 
-    IKEv2 responder.
 
-    (References: Pasi Eronen's mail "RE: Reauthentication in IKEv2",
 
-    2004-10-28.  "Policy lookups" thread, Oct/Nov 2004.  RFC 3748,
 
-    Section 7.3.)
 
- Eronen & Hoffman             Informational                     [Page 11]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
- 3.6.  Certificate Encoding Types
 
-    Section 3.6 defines a total of twelve different certificate encoding
 
-    types, and continues that "Specific syntax is for some of the
 
-    certificate type codes above is not defined in this document."
 
-    However, the text does not provide references to other documents that
 
-    would contain information about the exact contents and use of those
 
-    values.
 
-    Without this information, it is not possible to develop interoperable
 
-    implementations.  Therefore, this document recommends that the
 
-    following certificate encoding values should not be used before new
 
-    specifications that specify their use are available.
 
-         PKCS #7 wrapped X.509 certificate    1
 
-         PGP Certificate                      2
 
-         DNS Signed Key                       3
 
-         Kerberos Token                       6
 
-         SPKI Certificate                     9
 
-    This document recommends that most implementations should use only
 
-    those values that are "MUST"/"SHOULD" requirements in [IKEv2]; i.e.,
 
-    "X.509 Certificate - Signature" (4), "Raw RSA Key" (11), "Hash and
 
-    URL of X.509 certificate" (12), and "Hash and URL of X.509 bundle"
 
-    (13).
 
-    Furthermore, Section 3.7 says that the "Certificate Encoding" field
 
-    for the Certificate Request payload uses the same values as for
 
-    Certificate payload.  However, the contents of the "Certification
 
-    Authority" field are defined only for X.509 certificates (presumably
 
-    covering at least types 4, 10, 12, and 13).  This document recommends
 
-    that other values should not be used before new specifications that
 
-    specify their use are available.
 
-    The "Raw RSA Key" type needs one additional clarification.  Section
 
-    3.6 says it contains "a PKCS #1 encoded RSA key".  What this means is
 
-    a DER-encoded RSAPublicKey structure from PKCS#1 [PKCS1v21].
 
- 3.7.  Shared Key Authentication and Fixed PRF Key Size
 
-    Section 2.15 says that "If the negotiated prf takes a fixed-size key,
 
-    the shared secret MUST be of that fixed size".  This statement is
 
-    correct: the shared secret must be of the correct size.  If it is
 
-    not, it cannot be used; there is no padding, truncation, or other
 
-    processing involved to force it to that correct size.
 
- Eronen & Hoffman             Informational                     [Page 12]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    This requirement means that it is difficult to use these pseudo-
 
-    random functions (PRFs) with shared key authentication.  The authors
 
-    think this part of the specification was very poorly thought out, and
 
-    using PRFs with a fixed key size is likely to result in
 
-    interoperability problems.  Thus, we recommend that such PRFs should
 
-    not be used with shared key authentication.  PRF_AES128_XCBC
 
-    [RFC3664] originally used fixed key sizes; that RFC has been updated
 
-    to handle variable key sizes in [RFC4434].
 
-    Note that Section 2.13 also contains text that is related to PRFs
 
-    with fixed key size: "When the key for the prf function has fixed
 
-    length, the data provided as a key is truncated or padded with zeros
 
-    as necessary unless exceptional processing is explained following the
 
-    formula".  However, this text applies only to the prf+ construction,
 
-    so it does not contradict the text in Section 2.15.
 
-    (References: Paul Hoffman's mail "Re: ikev2-07: last nits",
 
-    2003-05-02.  Hugo Krawczyk's reply, 2003-05-12.  Thread "Question
 
-    about PRFs with fixed size key", Jan 2005.)
 
- 3.8.  EAP Authentication and Fixed PRF Key Size
 
-    As described in the previous section, PRFs with a fixed key size
 
-    require a shared secret of exactly that size.  This restriction
 
-    applies also to EAP authentication.  For instance, a PRF that
 
-    requires a 128-bit key cannot be used with EAP since [EAP] specifies
 
-    that the MSK is at least 512 bits long.
 
-    (References: Thread "Question about PRFs with fixed size key", Jan
 
-    2005.)
 
- 3.9.  Matching ID Payloads to Certificate Contents
 
-    In IKEv1, there was some confusion about whether or not the
 
-    identities in certificates used to authenticate IKE were required to
 
-    match the contents of the ID payloads.  The PKI4IPsec Working Group
 
-    produced the document [PKI4IPsec] which covers this topic in much
 
-    more detail.  However, Section 3.5 of [IKEv2] explicitly says that
 
-    the ID payload "does not necessarily have to match anything in the
 
-    CERT payload".
 
- Eronen & Hoffman             Informational                     [Page 13]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
- 3.10.  Message IDs for IKE_AUTH Messages
 
-    According to Section 2.2, "The IKE_SA initial setup messages will
 
-    always be numbered 0 and 1."  That is true when the IKE_AUTH exchange
 
-    does not use EAP.  When EAP is used, each pair of messages has their
 
-    message numbers incremented.  The first pair of AUTH messages will
 
-    have an ID of 1, the second will be 2, and so on.
 
-    (References: "Question about MsgID in AUTH exchange" thread, April
 
-    2005.)
 
- 4.  Creating CHILD_SAs
 
- 4.1.  Creating SAs with the CREATE_CHILD_SA Exchange
 
-    Section 1.3's organization does not lead to clear understanding of
 
-    what is needed in which environment.  The section can be reorganized
 
-    with subsections for each use of the CREATE_CHILD_SA exchange
 
-    (creating child SAs, rekeying IKE SAs, and rekeying child SAs.)
 
-    The new Section 1.3 with subsections and the above changes might look
 
-    like the following.
 
-    NEW-1.3 The CREATE_CHILD_SA Exchange
 
-         The CREATE_CHILD_SA Exchange is used to create new CHILD_SAs and
 
-         to rekey both IKE_SAs and CHILD_SAs.  This exchange consists of
 
-         a single request/response pair, and some of its function was
 
-         referred to as a phase 2 exchange in IKEv1.  It MAY be initiated
 
-         by either end of the IKE_SA after the initial exchanges are
 
-         completed.
 
-         All messages following the initial exchange are
 
-         cryptographically protected using the cryptographic algorithms
 
-         and keys negotiated in the first two messages of the IKE
 
-         exchange.  These subsequent messages use the syntax of the
 
-         Encrypted Payload described in section 3.14.  All subsequent
 
-         messages include an Encrypted Payload, even if they are referred
 
-         to in the text as "empty".
 
-         The CREATE_CHILD_SA is used for rekeying IKE_SAs and CHILD_SAs.
 
-         This section describes the first part of rekeying, the creation
 
-         of new SAs; Section 2.8 covers the mechanics of rekeying,
 
-         including moving traffic from old to new SAs and the deletion of
 
-         the old SAs.  The two sections must be read together to
 
-         understand the entire process of rekeying.
 
- Eronen & Hoffman             Informational                     [Page 14]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-         Either endpoint may initiate a CREATE_CHILD_SA exchange, so in
 
-         this section the term initiator refers to the endpoint
 
-         initiating this exchange.  An implementation MAY refuse all
 
-         CREATE_CHILD_SA requests within an IKE_SA.
 
-         The CREATE_CHILD_SA request MAY optionally contain a KE payload
 
-         for an additional Diffie-Hellman exchange to enable stronger
 
-         guarantees of forward secrecy for the CHILD_SA or IKE_SA.  The
 
-         keying material for the SA is a function of SK_d established
 
-         during the establishment of the IKE_SA, the nonces exchanged
 
-         during the CREATE_CHILD_SA exchange, and the Diffie-Hellman
 
-         value (if KE payloads are included in the CREATE_CHILD_SA
 
-         exchange).  The details are described in sections 2.17 and 2.18.
 
-         If a CREATE_CHILD_SA exchange includes a KEi payload, at least
 
-         one of the SA offers MUST include the Diffie-Hellman group of
 
-         the KEi.  The Diffie-Hellman group of the KEi MUST be an element
 
-         of the group the initiator expects the responder to accept
 
-         (additional Diffie-Hellman groups can be proposed).  If the
 
-         responder rejects the Diffie-Hellman group of the KEi payload,
 
-         the responder MUST reject the request and indicate its preferred
 
-         Diffie-Hellman group in the INVALID_KE_PAYLOAD Notification
 
-         payload.  In the case of such a rejection, the CREATE_CHILD_SA
 
-         exchange fails, and the initiator SHOULD retry the exchange with
 
-         a Diffie-Hellman proposal and KEi in the group that the
 
-         responder gave in the INVALID_KE_PAYLOAD.
 
-    NEW-1.3.1 Creating New CHILD_SAs with the CREATE_CHILD_SA Exchange
 
-         A CHILD_SA may be created by sending a CREATE_CHILD_SA request.
 
-         The CREATE_CHILD_SA request for creating a new CHILD_SA is:
 
-             Initiator                                 Responder
 
-            -----------                               -----------
 
-             HDR, SK {[N+], SA, Ni, [KEi],
 
-                        TSi, TSr}        -->
 
-         The initiator sends SA offer(s) in the SA payload, a nonce in
 
-         the Ni payload, optionally a Diffie-Hellman value in the KEi
 
-         payload, and the proposed traffic selectors for the proposed
 
-         CHILD_SA in the TSi and TSr payloads.  The request can also
 
-         contain Notify payloads that specify additional details for the
 
-         CHILD_SA: these include IPCOMP_SUPPORTED, USE_TRANSPORT_MODE,
 
-         ESP_TFC_PADDING_NOT_SUPPORTED, and NON_FIRST_FRAGMENTS_ALSO.
 
- Eronen & Hoffman             Informational                     [Page 15]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-         The CREATE_CHILD_SA response for creating a new CHILD_SA is:
 
-                                        <--    HDR, SK {[N+], SA, Nr,
 
-                                                     [KEr], TSi, TSr}
 
-         The responder replies with the accepted offer in an SA payload,
 
-         and a Diffie-Hellman value in the KEr payload if KEi was
 
-         included in the request and the selected cryptographic suite
 
-         includes that group.  As with the request, optional Notification
 
-         payloads can specify additional details for the CHILD_SA.
 
-         The traffic selectors for traffic to be sent on that SA are
 
-         specified in the TS payloads in the response, which may be a
 
-         subset of what the initiator of the CHILD_SA proposed.
 
-    The text about rekeying SAs can be found in Section 5.1 of this
 
-    document.
 
- 4.2.  Creating an IKE_SA without a CHILD_SA
 
-    CHILD_SAs can be created either by being piggybacked on the IKE_AUTH
 
-    exchange, or using a separate CREATE_CHILD_SA exchange.  The
 
-    specification is not clear about what happens if creating the
 
-    CHILD_SA during the IKE_AUTH exchange fails for some reason.
 
-    Our recommendation in this situation is that the IKE_SA is created as
 
-    usual.  This is also in line with how the CREATE_CHILD_SA exchange
 
-    works: a failure to create a CHILD_SA does not close the IKE_SA.
 
-    The list of responses in the IKE_AUTH exchange that do not prevent an
 
-    IKE_SA from being set up include at least the following:
 
-    NO_PROPOSAL_CHOSEN, TS_UNACCEPTABLE, SINGLE_PAIR_REQUIRED,
 
-    INTERNAL_ADDRESS_FAILURE, and FAILED_CP_REQUIRED.
 
-    (References: "Questions about internal address" thread, April 2005.)
 
- 4.3.  Diffie-Hellman for First CHILD_SA
 
-    Section 1.2 shows that IKE_AUTH messages do not contain KEi/KEr or
 
-    Ni/Nr payloads.  This implies that the SA payload in IKE_AUTH
 
-    exchange cannot contain Transform Type 4 (Diffie-Hellman Group) with
 
-    any other value than NONE.  Implementations should probably leave the
 
-    transform out entirely in this case.
 
- Eronen & Hoffman             Informational                     [Page 16]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
- 4.4.  Extended Sequence Numbers (ESN) Transform
 
-    The description of the ESN transform in Section 3.3 has be proved
 
-    difficult to understand.  The ESN transform has the following
 
-    meaning:
 
-    o  A proposal containing one ESN transform with value 0 means "do not
 
-       use extended sequence numbers".
 
-    o  A proposal containing one ESN transform with value 1 means "use
 
-       extended sequence numbers".
 
-    o  A proposal containing two ESN transforms with values 0 and 1 means
 
-       "I support both normal and extended sequence numbers, you choose".
 
-       (Obviously this case is only allowed in requests; the response
 
-       will contain only one ESN transform.)
 
-    In most cases, the exchange initiator will include either the first
 
-    or third alternative in its SA payload.  The second alternative is
 
-    rarely useful for the initiator: it means that using normal sequence
 
-    numbers is not acceptable (so if the responder does not support ESNs,
 
-    the exchange will fail with NO_PROPOSAL_CHOSEN).
 
-    Note that including the ESN transform is mandatory when creating
 
-    ESP/AH SAs (it was optional in earlier drafts of the IKEv2
 
-    specification).
 
-    (References: "Technical change needed to IKEv2 before publication",
 
-    "STRAW POLL: Dealing with the ESN negotiation interop issue in IKEv2"
 
-    and "Results of straw poll regarding: IKEv2 interoperability issue"
 
-    threads, March-April 2005.)
 
- 4.5.  Negotiation of ESP_TFC_PADDING_NOT_SUPPORTED
 
-    The description of ESP_TFC_PADDING_NOT_SUPPORTED notification in
 
-    Section 3.10.1 says that "This notification asserts that the sending
 
-    endpoint will NOT accept packets that contain Flow Confidentiality
 
-    (TFC) padding".
 
-    However, the text does not say in which messages this notification
 
-    should be included, or whether the scope of this notification is a
 
-    single CHILD_SA or all CHILD_SAs of the peer.
 
-    Our interpretation is that the scope is a single CHILD_SA, and thus
 
-    this notification is included in messages containing an SA payload
 
-    negotiating a CHILD_SA.  If neither endpoint accepts TFC padding,
 
-    this notification will be included in both the request proposing an
 
-    SA and the response accepting it.  If this notification is included
 
- Eronen & Hoffman             Informational                     [Page 17]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    in only one of the messages, TFC padding can still be sent in one
 
-    direction.
 
- 4.6.  Negotiation of NON_FIRST_FRAGMENTS_ALSO
 
-    NON_FIRST_FRAGMENTS_ALSO notification is described in Section 3.10.1
 
-    simply as "Used for fragmentation control.  See [RFC4301] for
 
-    explanation."
 
-    [RFC4301] says "Implementations that will transmit non-initial
 
-    fragments on a tunnel mode SA that makes use of non-trivial port (or
 
-    ICMP type/code or MH type) selectors MUST notify a peer via the IKE
 
-    NOTIFY NON_FIRST_FRAGMENTS_ALSO payload.  The peer MUST reject this
 
-    proposal if it will not accept non-initial fragments in this context.
 
-    If an implementation does not successfully negotiate transmission of
 
-    non-initial fragments for such an SA, it MUST NOT send such fragments
 
-    over the SA."
 
-    However, it is not clear exactly how the negotiation works.  Our
 
-    interpretation is that the negotiation works the same way as for
 
-    IPCOMP_SUPPORTED and USE_TRANSPORT_MODE: sending non-first fragments
 
-    is enabled only if NON_FIRST_FRAGMENTS_ALSO notification is included
 
-    in both the request proposing an SA and the response accepting it.
 
-    In other words, if the peer "rejects this proposal", it only omits
 
-    NON_FIRST_FRAGMENTS_ALSO notification from the response, but does not
 
-    reject the whole CHILD_SA creation.
 
- 4.7.  Semantics of Complex Traffic Selector Payloads
 
-    As described in Section 3.13, the TSi/TSr payloads can include one or
 
-    more individual traffic selectors.
 
-    There is no requirement that TSi and TSr contain the same number of
 
-    individual traffic selectors.  Thus, they are interpreted as follows:
 
-    a packet matches a given TSi/TSr if it matches at least one of the
 
-    individual selectors in TSi, and at least one of the individual
 
-    selectors in TSr.
 
-    For instance, the following traffic selectors:
 
-         TSi = ((17, 100, 192.0.1.66-192.0.1.66),
 
-                (17, 200, 192.0.1.66-192.0.1.66))
 
-         TSr = ((17, 300, 0.0.0.0-255.255.255.255),
 
-                (17, 400, 0.0.0.0-255.255.255.255))
 
-    would match UDP packets from 192.0.1.66 to anywhere, with any of the
 
-    four combinations of source/destination ports (100,300), (100,400),
 
-    (200,300), and (200, 400).
 
- Eronen & Hoffman             Informational                     [Page 18]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    This implies that some types of policies may require several CHILD_SA
 
-    pairs.  For instance, a policy matching only source/destination ports
 
-    (100,300) and (200,400), but not the other two combinations, cannot
 
-    be negotiated as a single CHILD_SA pair using IKEv2.
 
-    (References: "IKEv2 Traffic Selectors?" thread, Feb 2005.)
 
- 4.8.  ICMP Type/Code in Traffic Selector Payloads
 
-    The traffic selector types 7 and 8 can also refer to ICMP type and
 
-    code fields.  As described in Section 3.13.1, "For the ICMP protocol,
 
-    the two one-octet fields Type and Code are treated as a single 16-bit
 
-    integer (with Type in the most significant eight bits and Code in the
 
-    least significant eight bits) port number for the purposes of
 
-    filtering based on this field."
 
-    Since ICMP packets do not have separate source and destination port
 
-    fields, there is some room for confusion what exactly the four TS
 
-    payloads (two in the request, two in the response, each containing
 
-    both start and end port fields) should contain.
 
-    The answer to this question can be found from [RFC4301] Section
 
-    4.4.1.3.
 
-    To give a concrete example, if a host at 192.0.1.234 wants to create
 
-    a transport mode SA for sending "Destination Unreachable" packets
 
-    (ICMPv4 type 3) to 192.0.2.155, but is not willing to receive them
 
-    over this SA pair, the CREATE_CHILD_SA exchange would look like this:
 
-       Initiator                   Responder
 
-      -----------                 -----------
 
-       HDR, SK { N(USE_TRANSPORT_MODE), SA, Ni,
 
-                 TSi(1, 0x0300-0x03FF, 192.0.1.234-192.0.1.234),
 
-                 TSr(1, 65535-0, 192.0.2.155-192.0.2.155) } -->
 
-          <-- HDR, SK { N(USE_TRANSPORT_MODE), SA, Nr,
 
-                        TSi(1, 0x0300-0x03FF, 192.0.1.234-192.0.1.234),
 
-                        TSr(1, 65535-0, 192.0.2.155-192.0.2.155) }
 
-    Since IKEv2 always creates IPsec SAs in pairs, two SAs are also
 
-    created in this case, even though the second SA is never used for
 
-    data traffic.
 
-    An exchange creating an SA pair that can be used both for sending and
 
-    receiving "Destination Unreachable" places the same value in all the
 
-    port:
 
- Eronen & Hoffman             Informational                     [Page 19]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-       Initiator                   Responder
 
-      -----------                 -----------
 
-       HDR, SK { N(USE_TRANSPORT_MODE), SA, Ni,
 
-                 TSi(1, 0x0300-0x03FF, 192.0.1.234-192.0.1.234),
 
-                 TSr(1, 0x0300-0x03FF, 192.0.2.155-192.0.2.155) } -->
 
-          <-- HDR, SK { N(USE_TRANSPORT_MODE), SA, Nr,
 
-                        TSi(1, 0x0300-0x03FF, 192.0.1.234-192.0.1.234),
 
-                        TSr(1, 0x0300-0x03FF, 192.0.2.155-192.0.2.155) }
 
-    (References: "ICMP and MH TSs for IKEv2" thread, Sep 2005.)
 
- 4.9.  Mobility Header in Traffic Selector Payloads
 
-    Traffic selectors can use IP Protocol ID 135 to match the IPv6
 
-    mobility header [MIPv6].  However, the IKEv2 specification does not
 
-    define how to represent the "MH Type" field in traffic selectors.
 
-    At some point, it was expected that this will be defined in a
 
-    separate document later.  However, [RFC4301] says that "For IKE, the
 
-    IPv6 mobility header message type (MH type) is placed in the most
 
-    significant eight bits of the 16 bit local "port" selector".  The
 
-    direction semantics of TSi/TSr port fields are the same as for ICMP
 
-    and are described in the previous section.
 
-    (References: Tero Kivinen's mail "Issue #86: Add IPv6 mobility header
 
-    message type as selector", 2003-10-14.  "ICMP and MH TSs for IKEv2"
 
-    thread, Sep 2005.)
 
- 4.10.  Narrowing the Traffic Selectors
 
-    Section 2.9 describes how traffic selectors are negotiated when
 
-    creating a CHILD_SA.  A more concise summary of the narrowing process
 
-    is presented below.
 
-    o  If the responder's policy does not allow any part of the traffic
 
-       covered by TSi/TSr, it responds with TS_UNACCEPTABLE.
 
-    o  If the responder's policy allows the entire set of traffic covered
 
-       by TSi/TSr, no narrowing is necessary, and the responder can
 
-       return the same TSi/TSr values.
 
-    o  Otherwise, narrowing is needed.  If the responder's policy allows
 
-       all traffic covered by TSi[1]/TSr[1] (the first traffic selectors
 
-       in TSi/TSr) but not entire TSi/TSr, the responder narrows to an
 
-       acceptable subset of TSi/TSr that includes TSi[1]/TSr[1].
 
- Eronen & Hoffman             Informational                     [Page 20]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    o  If the responder's policy does not allow all traffic covered by
 
-       TSi[1]/TSr[1], but does allow some parts of TSi/TSr, it narrows to
 
-       an acceptable subset of TSi/TSr.
 
-    In the last two cases, there may be several subsets that are
 
-    acceptable (but their union is not); in this case, the responder
 
-    arbitrarily chooses one of them and includes ADDITIONAL_TS_POSSIBLE
 
-    notification in the response.
 
- 4.11.  SINGLE_PAIR_REQUIRED
 
-    The description of the SINGLE_PAIR_REQUIRED notify payload in
 
-    Sections 2.9 and 3.10.1 is not fully consistent.
 
-    We do not attempt to describe this payload in this document either,
 
-    since it is expected that most implementations will not have policies
 
-    that require separate SAs for each address pair.
 
-    Thus, if only some part (or parts) of the TSi/TSr proposed by the
 
-    initiator is (are) acceptable to the responder, most responders
 
-    should simply narrow TSi/TSr to an acceptable subset (as described in
 
-    the last two paragraphs of Section 2.9), rather than use
 
-    SINGLE_PAIR_REQUIRED.
 
- 4.12.  Traffic Selectors Violating Own Policy
 
-    Section 2.9 describes traffic selector negotiation in great detail.
 
-    One aspect of this negotiation that may need some clarification is
 
-    that when creating a new SA, the initiator should not propose traffic
 
-    selectors that violate its own policy.  If this rule is not followed,
 
-    valid traffic may be dropped.
 
-    This is best illustrated by an example.  Suppose that host A has a
 
-    policy whose effect is that traffic to 192.0.1.66 is sent via host B
 
-    encrypted using Advanced Encryption Standard (AES), and traffic to
 
-    all other hosts in 192.0.1.0/24 is also sent via B, but encrypted
 
-    using Triple Data Encryption Standard (3DES).  Suppose also that host
 
-    B accepts any combination of AES and 3DES.
 
-    If host A now proposes an SA that uses 3DES, and includes TSr
 
-    containing (192.0.1.0-192.0.1.0.255), this will be accepted by host
 
-    B.  Now, host B can also use this SA to send traffic from 192.0.1.66,
 
-    but those packets will be dropped by A since it requires the use of
 
-    AES for those traffic.  Even if host A creates a new SA only for
 
-    192.0.1.66 that uses AES, host B may freely continue to use the first
 
-    SA for the traffic.  In this situation, when proposing the SA, host A
 
-    should have followed its own policy, and included a TSr containing
 
-    ((192.0.1.0-192.0.1.65),(192.0.1.67-192.0.1.255)) instead.
 
- Eronen & Hoffman             Informational                     [Page 21]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    In general, if (1) the initiator makes a proposal "for traffic X
 
-    (TSi/TSr), do SA", and (2) for some subset X' of X, the initiator
 
-    does not actually accept traffic X' with SA, and (3) the initiator
 
-    would be willing to accept traffic X' with some SA' (!=SA), valid
 
-    traffic can be unnecessarily dropped since the responder can apply
 
-    either SA or SA' to traffic X'.
 
-    (References: "Question about "narrowing" ..." thread, Feb 2005.
 
-    "IKEv2 needs a "policy usage mode"..." thread, Feb 2005.  "IKEv2
 
-    Traffic Selectors?" thread, Feb 2005.  "IKEv2 traffic selector
 
-    negotiation examples", 2004-08-08.)
 
- 4.13.  Traffic Selector Authorization
 
-    IKEv2 relies on information in the Peer Authorization Database (PAD)
 
-    when determining what kind of IPsec SAs a peer is allowed to create.
 
-    This process is described in [RFC4301] Section 4.4.3.  When a peer
 
-    requests the creation of an IPsec SA with some traffic selectors, the
 
-    PAD must contain "Child SA Authorization Data" linking the identity
 
-    authenticated by IKEv2 and the addresses permitted for traffic
 
-    selectors.
 
-    For example, the PAD might be configured so that authenticated
 
-    identity "sgw23.example.com" is allowed to create IPsec SAs for
 
-    192.0.2.0/24, meaning this security gateway is a valid
 
-    "representative" for these addresses.  Host-to-host IPsec requires
 
-    similar entries, linking, for example, "fooserver4.example.com" with
 
-    192.0.1.66/32, meaning this identity a valid "owner" or
 
-    "representative" of the address in question.
 
-    As noted in [RFC4301], "It is necessary to impose these constraints
 
-    on creation of child SAs to prevent an authenticated peer from
 
-    spoofing IDs associated with other, legitimate peers."  In the
 
-    example given above, a correct configuration of the PAD prevents
 
-    sgw23 from creating IPsec SAs with address 192.0.1.66 and prevents
 
-    fooserver4 from creating IPsec SAs with addresses from 192.0.2.0/24.
 
-    It is important to note that simply sending IKEv2 packets using some
 
-    particular address does not imply a permission to create IPsec SAs
 
-    with that address in the traffic selectors.  For example, even if
 
-    sgw23 would be able to spoof its IP address as 192.0.1.66, it could
 
-    not create IPsec SAs matching fooserver4's traffic.
 
-    The IKEv2 specification does not specify how exactly IP address
 
-    assignment using configuration payloads interacts with the PAD.  Our
 
-    interpretation is that when a security gateway assigns an address
 
- Eronen & Hoffman             Informational                     [Page 22]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    using configuration payloads, it also creates a temporary PAD entry
 
-    linking the authenticated peer identity and the newly allocated inner
 
-    address.
 
-    It has been recognized that configuring the PAD correctly may be
 
-    difficult in some environments.  For instance, if IPsec is used
 
-    between a pair of hosts whose addresses are allocated dynamically
 
-    using Dynamic Host Configuration Protocol (DHCP), it is extremely
 
-    difficult to ensure that the PAD specifies the correct "owner" for
 
-    each IP address.  This would require a mechanism to securely convey
 
-    address assignments from the DHCP server and link them to identities
 
-    authenticated using IKEv2.
 
-    Due to this limitation, some vendors have been known to configure
 
-    their PADs to allow an authenticated peer to create IPsec SAs with
 
-    traffic selectors containing the same address that was used for the
 
-    IKEv2 packets.  In environments where IP spoofing is possible (i.e.,
 
-    almost everywhere) this essentially allows any peer to create IPsec
 
-    SAs with any traffic selectors.  This is not an appropriate or secure
 
-    configuration in most circumstances.  See [Aura05] for an extensive
 
-    discussion about this issue, and the limitations of host-to-host
 
-    IPsec in general.
 
- 5.  Rekeying and Deleting SAs
 
- 5.1.  Rekeying SAs with the CREATE_CHILD_SA Exchange
 
-    Continued from Section 4.1 of this document.
 
-  NEW-1.3.2 Rekeying IKE_SAs with the CREATE_CHILD_SA Exchange
 
-       The CREATE_CHILD_SA request for rekeying an IKE_SA is:
 
-           Initiator                                 Responder
 
-          -----------                               -----------
 
-           HDR, SK {SA, Ni, [KEi]} -->
 
-       The initiator sends SA offer(s) in the SA payload, a nonce in
 
-       the Ni payload, and optionally a Diffie-Hellman value in the KEi
 
-       payload.
 
-       The CREATE_CHILD_SA response for rekeying an IKE_SA is:
 
-                                      <--    HDR, SK {SA, Nr, [KEr]}
 
- Eronen & Hoffman             Informational                     [Page 23]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-       The responder replies (using the same Message ID to respond)
 
-       with the accepted offer in an SA payload, a nonce in the Nr
 
-       payload, and, optionally, a Diffie-Hellman value in the KEr
 
-       payload.
 
-       The new IKE_SA has its message counters set to 0, regardless of
 
-       what they were in the earlier IKE_SA.  The window size starts at
 
-       1 for any new IKE_SA.  The new initiator and responder SPIs are
 
-       supplied in the SPI fields of the SA payloads.
 
-  NEW-1.3.3 Rekeying CHILD_SAs with the CREATE_CHILD_SA Exchange
 
-       The CREATE_CHILD_SA request for rekeying a CHILD_SA is:
 
-           Initiator                                 Responder
 
-          -----------                               -----------
 
-           HDR, SK {N(REKEY_SA), [N+], SA,
 
-               Ni, [KEi], TSi, TSr}  -->
 
-       The leading Notify payload of type REKEY_SA identifies the
 
-       CHILD_SA being rekeyed, and it contains the SPI that the initiator
 
-       expects in the headers of inbound packets.  In addition, the
 
-       initiator sends SA offer(s) in the SA payload, a nonce in the Ni
 
-       payload, optionally a Diffie-Hellman value in the KEi payload,
 
-       and the proposed traffic selectors in the TSi and TSr payloads.
 
-       The request can also contain Notify payloads that specify
 
-       additional details for the CHILD_SA.
 
-       The CREATE_CHILD_SA response for rekeying a CHILD_SA is:
 
-                                      <--    HDR, SK {[N+], SA, Nr,
 
-                                                   [KEr], TSi, TSr}
 
-       The responder replies with the accepted offer in an SA payload,
 
-       and a Diffie-Hellman value in the KEr payload if KEi was
 
-       included in the request and the selected cryptographic suite
 
-       includes that group.
 
-       The traffic selectors for traffic to be sent on that SA are
 
-       specified in the TS payloads in the response, which may be a
 
-       subset of what the initiator of the CHILD_SA proposed.
 
- 5.2.  Rekeying the IKE_SA vs. Reauthentication
 
-    Rekeying the IKE_SA and reauthentication are different concepts in
 
-    IKEv2.  Rekeying the IKE_SA establishes new keys for the IKE_SA and
 
-    resets the Message ID counters, but it does not authenticate the
 
-    parties again (no AUTH or EAP payloads are involved).
 
- Eronen & Hoffman             Informational                     [Page 24]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    While rekeying the IKE_SA may be important in some environments,
 
-    reauthentication (the verification that the parties still have access
 
-    to the long-term credentials) is often more important.
 
-    IKEv2 does not have any special support for reauthentication.
 
-    Reauthentication is done by creating a new IKE_SA from scratch (using
 
-    IKE_SA_INIT/IKE_AUTH exchanges, without any REKEY_SA notify
 
-    payloads), creating new CHILD_SAs within the new IKE_SA (without
 
-    REKEY_SA notify payloads), and finally deleting the old IKE_SA (which
 
-    deletes the old CHILD_SAs as well).
 
-    This means that reauthentication also establishes new keys for the
 
-    IKE_SA and CHILD_SAs.  Therefore, while rekeying can be performed
 
-    more often than reauthentication, the situation where "authentication
 
-    lifetime" is shorter than "key lifetime" does not make sense.
 
-    While creation of a new IKE_SA can be initiated by either party
 
-    (initiator or responder in the original IKE_SA), the use of EAP
 
-    authentication and/or configuration payloads means in practice that
 
-    reauthentication has to be initiated by the same party as the
 
-    original IKE_SA.  IKEv2 base specification does not allow the
 
-    responder to request reauthentication in this case; however, this
 
-    functionality is added in [ReAuth].
 
-    (References: "Reauthentication in IKEv2" thread, Oct/Nov 2004.)
 
- 5.3.  SPIs When Rekeying the IKE_SA
 
-    Section 2.18 says that "New initiator and responder SPIs are supplied
 
-    in the SPI fields".  This refers to the SPI fields in the Proposal
 
-    structures inside the Security Association (SA) payloads, not the SPI
 
-    fields in the IKE header.
 
-    (References: Tom Stiemerling's mail "Rekey IKE SA", 2005-01-24.
 
-    Geoffrey Huang's reply, 2005-01-24.)
 
- 5.4.  SPI When Rekeying a CHILD_SA
 
-    Section 3.10.1 says that in REKEY_SA notifications, "The SPI field
 
-    identifies the SA being rekeyed."
 
-    Since CHILD_SAs always exist in pairs, there are two different SPIs.
 
-    The SPI placed in the REKEY_SA notification is the SPI the exchange
 
-    initiator would expect in inbound ESP or AH packets (just as in
 
-    Delete payloads).
 
- Eronen & Hoffman             Informational                     [Page 25]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
- 5.5.  Changing PRFs When Rekeying the IKE_SA
 
-    When rekeying the IKE_SA, Section 2.18 says that "SKEYSEED for the
 
-    new IKE_SA is computed using SK_d from the existing IKE_SA as
 
-    follows:
 
-       SKEYSEED = prf(SK_d (old), [g^ir (new)] | Ni | Nr)"
 
-    If the old and new IKE_SA selected a different PRF, it is not totally
 
-    clear which PRF should be used.
 
-    Since the rekeying exchange belongs to the old IKE_SA, it is the old
 
-    IKE_SA's PRF that is used.  This also follows the principle that the
 
-    same key (the old SK_d) should not be used with multiple
 
-    cryptographic algorithms.
 
-    Note that this may work poorly if the new IKE_SA's PRF has a fixed
 
-    key size, since the output of the PRF may not be of the correct size.
 
-    This supports our opinion earlier in the document that the use of
 
-    PRFs with a fixed key size is a bad idea.
 
-    (References: "Changing PRFs when rekeying the IKE_SA" thread, June
 
-    2005.)
 
- 5.6.  Deleting vs. Closing SAs
 
-    The IKEv2 specification talks about "closing" and "deleting" SAs, but
 
-    it is not always clear what exactly is meant.  However, other parts
 
-    of the specification make it clear that when local state related to a
 
-    CHILD_SA is removed, the SA must also be actively deleted with a
 
-    Delete payload.
 
-    In particular, Section 2.4 says that "If an IKE endpoint chooses to
 
-    delete CHILD_SAs, it MUST send Delete payloads to the other end
 
-    notifying it of the deletion".  Section 1.4 also explains that "ESP
 
-    and AH SAs always exist in pairs, with one SA in each direction.
 
-    When an SA is closed, both members of the pair MUST be closed."
 
- 5.7.  Deleting a CHILD_SA Pair
 
-    Section 1.4 describes how to delete SA pairs using the Informational
 
-    exchange: "To delete an SA, an INFORMATIONAL exchange with one or
 
-    more delete payloads is sent listing the SPIs (as they would be
 
-    expected in the headers of inbound packets) of the SAs to be deleted.
 
-    The recipient MUST close the designated SAs."
 
- Eronen & Hoffman             Informational                     [Page 26]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    The "one or more delete payloads" phrase has caused some confusion.
 
-    You never send delete payloads for the two sides of an SA in a single
 
-    message.  If you have many SAs to delete at the same time (such as
 
-    the nested example given in that paragraph), you include delete
 
-    payloads for the inbound half of each SA in your Informational
 
-    exchange.
 
- 5.8.  Deleting an IKE_SA
 
-    Since IKE_SAs do not exist in pairs, it is not totally clear what the
 
-    response message should contain when the request deleted the IKE_SA.
 
-    Since there is no information that needs to be sent to the other side
 
-    (except that the request was received), an empty Informational
 
-    response seems like the most logical choice.
 
-    (References: "Question about delete IKE SA" thread, May 2005.)
 
- 5.9.  Who is the original initiator of IKE_SA
 
-    In the IKEv2 document, "initiator" refers to the party who initiated
 
-    the exchange being described, and "original initiator" refers to the
 
-    party who initiated the whole IKE_SA.  However, there is some
 
-    potential for confusion because the IKE_SA can be rekeyed by either
 
-    party.
 
-    To clear up this confusion, we propose that "original initiator"
 
-    always refers to the party who initiated the exchange that resulted
 
-    in the current IKE_SA.  In other words, if the "original responder"
 
-    starts rekeying the IKE_SA, that party becomes the "original
 
-    initiator" of the new IKE_SA.
 
-    (References: Paul Hoffman's mail "Original initiator in IKEv2",
 
-    2005-04-21.)
 
- 5.10.  Comparing Nonces
 
-    Section 2.8 about rekeying says that "If redundant SAs are created
 
-    though such a collision, the SA created with the lowest of the four
 
-    nonces used in the two exchanges SHOULD be closed by the endpoint
 
-    that created it."
 
- Eronen & Hoffman             Informational                     [Page 27]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    Here "lowest" uses an octet-by-octet (lexicographical) comparison
 
-    (instead of, for instance, comparing the nonces as large integers).
 
-    In other words, start by comparing the first octet; if they're equal,
 
-    move to the next octet, and so on.  If you reach the end of one
 
-    nonce, that nonce is the lower one.
 
-    (References: "IKEv2 rekeying question" thread, July 2005.)
 
- 5.11.  Exchange Collisions
 
-    Since IKEv2 exchanges can be initiated by both peers, it is possible
 
-    that two exchanges affecting the same SA partly overlap.  This can
 
-    lead to a situation where the SA state information is temporarily not
 
-    synchronized, and a peer can receive a request it cannot process in a
 
-    normal fashion.  Some of these corner cases are discussed in the
 
-    specification, some are not.
 
-    Obviously, using a window size greater than one leads to infinitely
 
-    more complex situations, especially if requests are processed out of
 
-    order.  In this section, we concentrate on problems that can arise
 
-    even with window size 1.
 
-    (References: "IKEv2: invalid SPI in DELETE payload" thread, Dec 2005/
 
-    Jan 2006.  "Problem with exchanges collisions" thread, Dec 2005.)
 
- 5.11.1.  Simultaneous CHILD_SA Close
 
-    Probably the simplest case happens if both peers decide to close the
 
-    same CHILD_SA pair at the same time:
 
-       Host A                      Host B
 
-      --------                    --------
 
-       send req1: D(SPIa) -->
 
-                               <-- send req2: D(SPIb)
 
-                               --> recv req1
 
-                               <-- send resp1: ()
 
-       recv resp1
 
-       recv req2
 
-       send resp2: () -->
 
-                               --> recv resp2
 
-    This case is described in Section 1.4 and is handled by omitting the
 
-    Delete payloads from the response messages.
 
- Eronen & Hoffman             Informational                     [Page 28]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
- 5.11.2.  Simultaneous IKE_SA Close
 
-    Both peers can also decide to close the IKE_SA at the same time.  The
 
-    desired end result is obvious; however, in certain cases the final
 
-    exchanges may not be fully completed.
 
-       Host A                      Host B
 
-      --------                    --------
 
-       send req1: D() -->
 
-                               <-- send req2: D()
 
-                               --> recv req1
 
-    At this point, host B should reply as usual (with empty Informational
 
-    response), close the IKE_SA, and stop retransmitting req2.  This is
 
-    because once host A receives resp1, it may not be able to reply any
 
-    longer.  The situation is symmetric, so host A should behave the same
 
-    way.
 
-       Host A                      Host B
 
-      --------                    --------
 
-                               <-- send resp1: ()
 
-       send resp2: ()
 
-    Even if neither resp1 nor resp2 ever arrives, the end result is still
 
-    correct: the IKE_SA is gone.  The same happens if host A never
 
-    receives req2.
 
- 5.11.3.  Simultaneous CHILD_SA Rekeying
 
-    Another case that is described in the specification is simultaneous
 
-    rekeying.  Section 2.8 says
 
-       "If the two ends have the same lifetime policies, it is possible
 
-       that both will initiate a rekeying at the same time (which will
 
-       result in redundant SAs).  To reduce the probability of this
 
-       happening, the timing of rekeying requests SHOULD be jittered
 
-       (delayed by a random amount of time after the need for rekeying is
 
-       noticed).
 
-       This form of rekeying may temporarily result in multiple similar
 
-       SAs between the same pairs of nodes.  When there are two SAs
 
-       eligible to receive packets, a node MUST accept incoming packets
 
-       through either SA.  If redundant SAs are created though such a
 
-       collision, the SA created with the lowest of the four nonces used
 
-       in the two exchanges SHOULD be closed by the endpoint that created
 
-       it."
 
- Eronen & Hoffman             Informational                     [Page 29]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    However, a better explanation on what impact this has on
 
-    implementations is needed.  Assume that hosts A and B have an
 
-    existing IPsec SA pair with SPIs (SPIa1,SPIb1), and both start
 
-    rekeying it at the same time:
 
-       Host A                      Host B
 
-      --------                    --------
 
-       send req1: N(REKEY_SA,SPIa1),
 
-          SA(..,SPIa2,..),Ni1,..  -->
 
-                               <-- send req2: N(REKEY_SA,SPIb1),
 
-                                      SA(..,SPIb2,..),Ni2,..
 
-       recv req2 <--
 
-    At this point, A knows there is a simultaneous rekeying going on.
 
-    However, it cannot yet know which of the exchanges will have the
 
-    lowest nonce, so it will just note the situation and respond as
 
-    usual.
 
-       send resp2: SA(..,SPIa3,..),Nr1,.. -->
 
-                               --> recv req1
 
-    Now B also knows that simultaneous rekeying is going on.  Similarly
 
-    as host A, it has to respond as usual.
 
-                               <-- send resp1: SA(..,SPIb3,..),Nr2,..
 
-        recv resp1 <--
 
-                               --> recv resp2
 
-    At this point, there are three CHILD_SA pairs between A and B (the
 
-    old one and two new ones).  A and B can now compare the nonces.
 
-    Suppose that the lowest nonce was Nr1 in message resp2; in this case,
 
-    B (the sender of req2) deletes the redundant new SA, and A (the node
 
-    that initiated the surviving rekeyed SA) deletes the old one.
 
-       send req3: D(SPIa1) -->
 
-                               <-- send req4: D(SPIb2)
 
-                               --> recv req3
 
-                               <-- send resp4: D(SPIb1)
 
-       recv req4 <--
 
-       send resp4: D(SPIa3) -->
 
-    The rekeying is now finished.
 
-    However, there is a second possible sequence of events that can
 
-    happen if some packets are lost in the network, resulting in
 
-    retransmissions.  The rekeying begins as usual, but A's first packet
 
-    (req1) is lost.
 
- Eronen & Hoffman             Informational                     [Page 30]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-       Host A                      Host B
 
-      --------                    --------
 
-       send req1: N(REKEY_SA,SPIa1),
 
-          SA(..,SPIa2,..),Ni1,..  -->  (lost)
 
-                               <-- send req2: N(REKEY_SA,SPIb1),
 
-                                      SA(..,SPIb2,..),Ni2,..
 
-       recv req2 <--
 
-       send resp2: SA(..,SPIa3,..),Nr1,.. -->
 
-                               --> recv resp2
 
-                               <-- send req3: D(SPIb1)
 
-       recv req3 <--
 
-       send resp3: D(SPIa1) -->
 
-                               --> recv resp3
 
-    From B's point of view, the rekeying is now completed, and since it
 
-    has not yet received A's req1, it does not even know that these was
 
-    simultaneous rekeying.  However, A will continue retransmitting the
 
-    message, and eventually it will reach B.
 
-       resend req1 -->
 
-                                --> recv req1
 
-    What should B do in this point?  To B, it looks like A is trying to
 
-    rekey an SA that no longer exists; thus failing the request with
 
-    something non-fatal such as NO_PROPOSAL_CHOSEN seems like a
 
-    reasonable approach.
 
-                                <-- send resp1: N(NO_PROPOSAL_CHOSEN)
 
-       recv resp1 <--
 
-    When A receives this error, it already knows there was simultaneous
 
-    rekeying, so it can ignore the error message.
 
- 5.11.4.  Simultaneous IKE_SA Rekeying
 
-    Probably the most complex case occurs when both peers try to rekey
 
-    the IKE_SA at the same time.  Basically, the text in Section 2.8
 
-    applies to this case as well; however, it is important to ensure that
 
-    the CHILD_SAs are inherited by the right IKE_SA.
 
-    The case where both endpoints notice the simultaneous rekeying works
 
-    the same way as with CHILD_SAs.  After the CREATE_CHILD_SA exchanges,
 
-    three IKE_SAs exist between A and B; the one containing the lowest
 
-    nonce inherits the CHILD_SAs.
 
-    However, there is a twist to the other case where one rekeying
 
-    finishes first:
 
- Eronen & Hoffman             Informational                     [Page 31]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-       Host A                      Host B
 
-      --------                    --------
 
-       send req1:
 
-          SA(..,SPIa1,..),Ni1,.. -->
 
-                               <-- send req2: SA(..,SPIb1,..),Ni2,..
 
-                               --> recv req1
 
-                               <-- send resp1: SA(..,SPIb2,..),Nr2,..
 
-       recv resp1 <--
 
-       send req3: D() -->
 
-                               --> recv req3
 
-    At this point, host B sees a request to close the IKE_SA.  There's
 
-    not much more to do than to reply as usual.  However, at this point
 
-    host B should stop retransmitting req2, since once host A receives
 
-    resp3, it will delete all the state associated with the old IKE_SA
 
-    and will not be able to reply to it.
 
-                               <-- send resp3: ()
 
- 5.11.5.  Closing and Rekeying a CHILD_SA
 
-    A case similar to simultaneous rekeying can occur if one peer decides
 
-    to close an SA and the other peer tries to rekey it:
 
-       Host A                      Host B
 
-      --------                    --------
 
-       send req1: D(SPIa) -->
 
-                               <-- send req2: N(REKEY_SA,SPIb),SA,..
 
-                               --> recv req1
 
-    At this point, host B notices that host A is trying to close an SA
 
-    that host B is currently rekeying.  Replying as usual is probably the
 
-    best choice:
 
-                               <-- send resp1: D(SPIb)
 
-    Depending on in which order req2 and resp1 arrive, host A sees either
 
-    a request to rekey an SA that it is currently closing, or a request
 
-    to rekey an SA that does not exist.  In both cases,
 
-    NO_PROPOSAL_CHOSEN is probably fine.
 
-       recv req2
 
-       recv resp1
 
-       send resp2: N(NO_PROPOSAL_CHOSEN) -->
 
-                               --> recv resp2
 
- Eronen & Hoffman             Informational                     [Page 32]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
- 5.11.6.  Closing a New CHILD_SA
 
-    Yet another case occurs when host A creates a CHILD_SA pair, but soon
 
-    thereafter host B decides to delete it (possible because its policy
 
-    changed):
 
-       Host A                      Host B
 
-      --------                    --------
 
-       send req1: [N(REKEY_SA,SPIa1)],
 
-          SA(..,SPIa2,..),.. -->
 
-                               --> recv req1
 
-                        (lost) <-- send resp1: SA(..,SPIb2,..),..
 
-                               <-- send req2: D(SPIb2)
 
-       recv req2
 
-    At this point, host A has not yet received message resp1 (and is
 
-    retransmitting message req1), so it does not recognize SPIb in
 
-    message req2.  What should host A do?
 
-    One option would be to reply with an empty Informational response.
 
-    However, this same reply would also be sent if host A has received
 
-    resp1, but has already sent a new request to delete the SA that was
 
-    just created.  This would lead to a situation where the peers are no
 
-    longer in sync about which SAs exist between them.  However, host B
 
-    would eventually notice that the other half of the CHILD_SA pair has
 
-    not been deleted.  Section 1.4 describes this case and notes that "a
 
-    node SHOULD regard half-closed connections as anomalous and audit
 
-    their existence should they persist", and continues that "if
 
-    connection state becomes sufficiently messed up, a node MAY close the
 
-    IKE_SA".
 
-    Another solution that has been proposed is to reply with an
 
-    INVALID_SPI notification that contains SPIb.  This would explicitly
 
-    tell host B that the SA was not deleted, so host B could try deleting
 
-    it again later.  However, this usage is not part of the IKEv2
 
-    specification and would not be in line with normal use of the
 
-    INVALID_SPI notification where the data field contains the SPI the
 
-    recipient of the notification would put in outbound packets.
 
-    Yet another solution would be to ignore req2 at this time and wait
 
-    until we have received resp1.  However, this alternative has not been
 
-    fully analyzed at this time; in general, ignoring valid requests is
 
-    always a bit dangerous, because both endpoints could do it, leading
 
-    to a deadlock.
 
-    This document recommends the first alternative.
 
- Eronen & Hoffman             Informational                     [Page 33]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
- 5.11.7.  Rekeying a New CHILD_SA
 
-    Yet another case occurs when a CHILD_SA is rekeyed soon after it has
 
-    been created:
 
-       Host A                      Host B
 
-      --------                    --------
 
-       send req1: [N(REKEY_SA,SPIa1)],
 
-          SA(..,SPIa2,..),..  -->
 
-                        (lost) <-- send resp1: SA(..,SPIb2,..),..
 
-                               <-- send req2: N(REKEY_SA,SPIb2),
 
-                                      SA(..,SPIb3,..),..
 
-       recv req2 <--
 
-    To host A, this looks like a request to rekey an SA that does not
 
-    exist.  Like in the simultaneous rekeying case, replying with
 
-    NO_PROPOSAL_CHOSEN is probably reasonable:
 
-       send resp2: N(NO_PROPOSAL_CHOSEN) -->
 
-       recv resp1
 
- 5.11.8.  Collisions with IKE_SA Rekeying
 
-    Another set of cases occurs when one peer starts rekeying the IKE_SA
 
-    at the same time the other peer starts creating, rekeying, or closing
 
-    a CHILD_SA.  Suppose that host B starts creating a CHILD_SA, and soon
 
-    after, host A starts rekeying the IKE_SA:
 
-       Host A                      Host B
 
-      --------                    --------
 
-                               <-- send req1: SA,Ni1,TSi,TSr
 
-       send req2: SA,Ni2,.. -->
 
-                               --> recv req2
 
-    What should host B do at this point?  Replying as usual would seem
 
-    like a reasonable choice:
 
-                               <-- send resp2: SA,Ni2,..
 
-       recv resp2 <--
 
-       send req3: D() -->
 
-                               --> recv req3
 
-    Now, a problem arises: If host B now replies normally with an empty
 
-    Informational response, this will cause host A to delete state
 
-    associated with the IKE_SA.  This means host B should stop
 
-    retransmitting req1.  However, host B cannot know whether or not host
 
-    A has received req1.  If host A did receive it, it will move the
 
- Eronen & Hoffman             Informational                     [Page 34]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    CHILD_SA to the new IKE_SA as usual, and the state information will
 
-    then be out of sync.
 
-    It seems this situation is tricky to handle correctly.  Our proposal
 
-    is as follows: if a host receives a request to rekey the IKE_SA when
 
-    it has CHILD_SAs in "half-open" state (currently being created or
 
-    rekeyed), it should reply with NO_PROPOSAL_CHOSEN.  If a host
 
-    receives a request to create or rekey a CHILD_SA after it has started
 
-    rekeying the IKE_SA, it should reply with NO_ADDITIONAL_SAS.
 
-    The case where CHILD_SAs are being closed is even worse.  Our
 
-    recommendation is that if a host receives a request to rekey the
 
-    IKE_SA when it has CHILD_SAs in "half-closed" state (currently being
 
-    closed), it should reply with NO_PROPOSAL_CHOSEN.  And if a host
 
-    receives a request to close a CHILD_SA after it has started rekeying
 
-    the IKE_SA, it should reply with an empty Informational response.
 
-    This ensures that at least the other peer will eventually notice that
 
-    the CHILD_SA is still in "half-closed" state and will start a new
 
-    IKE_SA from scratch.
 
- 5.11.9.  Closing and Rekeying the IKE_SA
 
-    The final case considered in this section occurs if one peer decides
 
-    to close the IKE_SA while the other peer tries to rekey it.
 
-       Host A                      Host B
 
-      --------                    --------
 
-       send req1: SA(..,SPIa1,..),Ni1 -->
 
-                               <-- send req2: D()
 
-                               --> recv req1
 
-       recv req2 <--
 
-    At this point, host B should probably reply with NO_PROPOSAL_CHOSEN,
 
-    and host A should reply as usual, close the IKE_SA, and stop
 
-    retransmitting req1.
 
-                               <-- send resp1: N(NO_PROPOSAL_CHOSEN)
 
-       send resp2: ()
 
-    If host A wants to continue communication with B, it can now start a
 
-    new IKE_SA.
 
- 5.11.10.  Summary
 
-    If a host receives a request to rekey:
 
-    o  a CHILD_SA pair that the host is currently trying to close: reply
 
-       with NO_PROPOSAL_CHOSEN.
 
- Eronen & Hoffman             Informational                     [Page 35]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    o  a CHILD_SA pair that the host is currently rekeying: reply as
 
-       usual, but prepare to close redundant SAs later based on the
 
-       nonces.
 
-    o  a CHILD_SA pair that does not exist: reply with
 
-       NO_PROPOSAL_CHOSEN.
 
-    o  the IKE_SA, and the host is currently rekeying the IKE_SA: reply
 
-       as usual, but prepare to close redundant SAs and move inherited
 
-       CHILD_SAs later based on the nonces.
 
-    o  the IKE_SA, and the host is currently creating, rekeying, or
 
-       closing a CHILD_SA: reply with NO_PROPOSAL_CHOSEN.
 
-    o  the IKE_SA, and the host is currently trying to close the IKE_SA:
 
-       reply with NO_PROPOSAL_CHOSEN.
 
-    If a host receives a request to close:
 
-    o  a CHILD_SA pair that the host is currently trying to close: reply
 
-       without Delete payloads.
 
-    o  a CHILD_SA pair that the host is currently rekeying: reply as
 
-       usual, with Delete payload.
 
-    o  a CHILD_SA pair that does not exist: reply without Delete
 
-       payloads.
 
-    o  the IKE_SA, and the host is currently rekeying the IKE_SA: reply
 
-       as usual, and forget about our own rekeying request.
 
-    o  the IKE_SA, and the host is currently trying to close the IKE_SA:
 
-       reply as usual, and forget about our own close request.
 
-    If a host receives a request to create or rekey a CHILD_SA when it is
 
-    currently rekeying the IKE_SA: reply with NO_ADDITIONAL_SAS.
 
-    If a host receives a request to delete a CHILD_SA when it is
 
-    currently rekeying the IKE_SA: reply without Delete payloads.
 
- 5.12.  Diffie-Hellman and Rekeying the IKE_SA
 
-    There has been some confusion whether doing a new Diffie-Hellman
 
-    exchange is mandatory when the IKE_SA is rekeyed.
 
-    It seems that this case is allowed by the IKEv2 specification.
 
-    Section 2.18 shows the Diffie-Hellman term (g^ir) in brackets.
 
-    Section 3.3.3 does not contradict this when it says that including
 
- Eronen & Hoffman             Informational                     [Page 36]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    the D-H transform is mandatory: although including the transform is
 
-    mandatory, it can contain the value "NONE".
 
-    However, having the option to skip the Diffie-Hellman exchange when
 
-    rekeying the IKE_SA does not add useful functionality to the
 
-    protocol.  The main purpose of rekeying the IKE_SA is to ensure that
 
-    the compromise of old keying material does not provide information
 
-    about the current keys, or vice versa.  This requires performing the
 
-    Diffie-Hellman exchange when rekeying.  Furthermore, it is likely
 
-    that this option would have been removed from the protocol as
 
-    unnecessary complexity had it been discussed earlier.
 
-    Given this, we recommend that implementations should have a hard-
 
-    coded policy that requires performing a new Diffie-Hellman exchange
 
-    when rekeying the IKE_SA.  In other words, the initiator should not
 
-    propose the value "NONE" for the D-H transform, and the responder
 
-    should not accept such a proposal.  This policy also implies that a
 
-    successful exchange rekeying the IKE_SA always includes the KEi/KEr
 
-    payloads.
 
-    (References: "Rekeying IKE_SAs with the CREATE_CHILD_SA exhange"
 
-    thread, Oct 2005.  "Comments of
 
-    draft-eronen-ipsec-ikev2-clarifications-02.txt" thread, Apr 2005.)
 
- 6.  Configuration Payloads
 
- 6.1.  Assigning IP Addresses
 
-    Section 2.9 talks about traffic selector negotiation and mentions
 
-    that "In support of the scenario described in section 1.1.3, an
 
-    initiator may request that the responder assign an IP address and
 
-    tell the initiator what it is."
 
-    This sentence is correct, but its placement is slightly confusing.
 
-    IKEv2 does allow the initiator to request assignment of an IP address
 
-    from the responder, but this is done using configuration payloads,
 
-    not traffic selector payloads.  An address in a TSi payload in a
 
-    response does not mean that the responder has assigned that address
 
-    to the initiator; it only means that if packets matching these
 
-    traffic selectors are sent by the initiator, IPsec processing can be
 
-    performed as agreed for this SA.  The TSi payload itself does not
 
-    give the initiator permission to configure the initiator's TCP/IP
 
-    stack with the address and use it as its source address.
 
-    In other words, IKEv2 does not have two different mechanisms for
 
-    assigning addresses, but only one: configuration payloads.  In the
 
-    scenario described in Section 1.1.3, both configuration and traffic
 
-    selector payloads are usually included in the same message, and they
 
- Eronen & Hoffman             Informational                     [Page 37]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    often contain the same information in the response message (see
 
-    Section 6.3 of this document for some examples).  However, their
 
-    semantics are still different.
 
- 6.2.  Requesting any INTERNAL_IP4/IP6_ADDRESS
 
-    When describing the INTERNAL_IP4/IP6_ADDRESS attributes, Section
 
-    3.15.1 says that "In a request message, the address specified is a
 
-    requested address (or zero if no specific address is requested)".
 
-    The question here is whether "zero" means an address "0.0.0.0" or a
 
-    zero-length string.
 
-    Earlier, the same section also says that "If an attribute in the
 
-    CFG_REQUEST Configuration Payload is not zero-length, it is taken as
 
-    a suggestion for that attribute".  Also, the table of configuration
 
-    attributes shows that the length of INTERNAL_IP4_ADDRESS is either "0
 
-    or 4 octets", and likewise, INTERNAL_IP6_ADDRESS is either "0 or 17
 
-    octets".
 
-    Thus, if the client does not request a specific address, it includes
 
-    a zero-length INTERNAL_IP4/IP6_ADDRESS attribute, not an attribute
 
-    containing an all-zeroes address.  The example in 2.19 is thus
 
-    incorrect, since it shows the attribute as
 
-    "INTERNAL_ADDRESS(0.0.0.0)".
 
-    However, since the value is only a suggestion, implementations are
 
-    recommended to ignore suggestions they do not accept; or in other
 
-    words, to treat the same way a zero-length INTERNAL_IP4_ADDRESS,
 
-    "0.0.0.0", and any other addresses the implementation does not
 
-    recognize as a reasonable suggestion.
 
- 6.3.  INTERNAL_IP4_SUBNET/INTERNAL_IP6_SUBNET
 
-    Section 3.15.1 describes the INTERNAL_IP4_SUBNET as "The protected
 
-    sub-networks that this edge-device protects.  This attribute is made
 
-    up of two fields: the first is an IP address and the second is a
 
-    netmask.  Multiple sub-networks MAY be requested.  The responder MAY
 
-    respond with zero or more sub-network attributes."
 
-    INTERNAL_IP6_SUBNET is defined in a similar manner.
 
-    This raises two questions: first, since this information is usually
 
-    included in the TSr payload, what functionality does this attribute
 
-    add?  And second, what does this attribute mean in CFG_REQUESTs?
 
-    For the first question, there seem to be two sensible
 
-    interpretations.  Clearly TSr (in IKE_AUTH or CREATE_CHILD_SA
 
-    response) indicates which subnets are accessible through the SA that
 
-    was just created.
 
- Eronen & Hoffman             Informational                     [Page 38]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    The first interpretation of the INTERNAL_IP4/6_SUBNET attributes is
 
-    that they indicate additional subnets that can be reached through
 
-    this gateway, but need a separate SA.  According to this
 
-    interpretation, the INTERNAL_IP4/6_SUBNET attributes are useful
 
-    mainly when they contain addresses not included in TSr.
 
-    The second interpretation is that the INTERNAL_IP4/6_SUBNET
 
-    attributes express the gateway's policy about what traffic should be
 
-    sent through the gateway.  The client can choose whether other
 
-    traffic (covered by TSr, but not in INTERNAL_IP4/6_SUBNET) is sent
 
-    through the gateway or directly to the destination.  According to
 
-    this interpretation, the attributes are useful mainly when TSr
 
-    contains addresses not included in the INTERNAL_IP4/6_SUBNET
 
-    attributes.
 
-    It turns out that these two interpretations are not incompatible, but
 
-    rather two sides of the same principle: traffic to the addresses
 
-    listed in the INTERNAL_IP4/6_SUBNET attributes should be sent via
 
-    this gateway.  If there are no existing IPsec SAs whose traffic
 
-    selectors cover the address in question, new SAs have to be created.
 
-    A couple of examples are given below.  For instance, if there are two
 
-    subnets, 192.0.1.0/26 and 192.0.2.0/24, and the client's request
 
-    contains the following:
 
-         CP(CFG_REQUEST) =
 
-           INTERNAL_IP4_ADDRESS()
 
-         TSi = (0, 0-65535, 0.0.0.0-255.255.255.255)
 
-         TSr = (0, 0-65535, 0.0.0.0-255.255.255.255)
 
-    Then a valid response could be the following (in which TSr and
 
-    INTERNAL_IP4_SUBNET contain the same information):
 
-         CP(CFG_REPLY) =
 
-           INTERNAL_IP4_ADDRESS(192.0.1.234)
 
-           INTERNAL_IP4_SUBNET(192.0.1.0/255.255.255.192)
 
-           INTERNAL_IP4_SUBNET(192.0.2.0/255.255.255.0)
 
-         TSi = (0, 0-65535, 192.0.1.234-192.0.1.234)
 
-         TSr = ((0, 0-65535, 192.0.1.0-192.0.1.63),
 
-                (0, 0-65535, 192.0.2.0-192.0.2.255))
 
-    In these cases, the INTERNAL_IP4_SUBNET does not really carry any
 
-    useful information.  Another possible reply would have been this:
 
-         CP(CFG_REPLY) =
 
-           INTERNAL_IP4_ADDRESS(192.0.1.234)
 
-           INTERNAL_IP4_SUBNET(192.0.1.0/255.255.255.192)
 
-           INTERNAL_IP4_SUBNET(192.0.2.0/255.255.255.0)
 
- Eronen & Hoffman             Informational                     [Page 39]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-         TSi = (0, 0-65535, 192.0.1.234-192.0.1.234)
 
-         TSr = (0, 0-65535, 0.0.0.0-255.255.255.255)
 
-    This would mean that the client can send all its traffic through the
 
-    gateway, but the gateway does not mind if the client sends traffic
 
-    not included by INTERNAL_IP4_SUBNET directly to the destination
 
-    (without going through the gateway).
 
-    A different situation arises if the gateway has a policy that
 
-    requires the traffic for the two subnets to be carried in separate
 
-    SAs.  Then a response like this would indicate to the client that if
 
-    it wants access to the second subnet, it needs to create a separate
 
-    SA:
 
-         CP(CFG_REPLY) =
 
-           INTERNAL_IP4_ADDRESS(192.0.1.234)
 
-           INTERNAL_IP4_SUBNET(192.0.1.0/255.255.255.192)
 
-           INTERNAL_IP4_SUBNET(192.0.2.0/255.255.255.0)
 
-         TSi = (0, 0-65535, 192.0.1.234-192.0.1.234)
 
-         TSr = (0, 0-65535, 192.0.1.0-192.0.1.63)
 
-    INTERNAL_IP4_SUBNET can also be useful if the client's TSr included
 
-    only part of the address space.  For instance, if the client requests
 
-    the following:
 
-         CP(CFG_REQUEST) =
 
-           INTERNAL_IP4_ADDRESS()
 
-         TSi = (0, 0-65535, 0.0.0.0-255.255.255.255)
 
-         TSr = (0, 0-65535, 192.0.2.155-192.0.2.155)
 
-    Then the gateway's reply could be this:
 
-         CP(CFG_REPLY) =
 
-           INTERNAL_IP4_ADDRESS(192.0.1.234)
 
-           INTERNAL_IP4_SUBNET(192.0.1.0/255.255.255.192)
 
-           INTERNAL_IP4_SUBNET(192.0.2.0/255.255.255.0)
 
-         TSi = (0, 0-65535, 192.0.1.234-192.0.1.234)
 
-         TSr = (0, 0-65535, 192.0.2.155-192.0.2.155)
 
-    It is less clear what the attributes mean in CFG_REQUESTs, and
 
-    whether other lengths than zero make sense in this situation (but for
 
-    INTERNAL_IP6_SUBNET, zero length is not allowed at all!).  This
 
-    document recommends that implementations should not include
 
-    INTERNAL_IP4_SUBNET or INTERNAL_IP6_SUBNET attributes in
 
-    CFG_REQUESTs.
 
-    For the IPv4 case, this document recommends using only netmasks
 
-    consisting of some amount of "1" bits followed by "0" bits; for
 
- Eronen & Hoffman             Informational                     [Page 40]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    instance, "255.0.255.0" would not be a valid netmask for
 
-    INTERNAL_IP4_SUBNET.
 
-    It is also worthwhile to note that the contents of the INTERNAL_IP4/
 
-    6_SUBNET attributes do not imply link boundaries.  For instance, a
 
-    gateway providing access to a large company intranet using addresses
 
-    from the 10.0.0.0/8 block can send a single INTERNAL_IP4_SUBNET
 
-    attribute (10.0.0.0/255.0.0.0) even if the intranet has hundreds of
 
-    routers and separate links.
 
-    (References: Tero Kivinen's mail "Intent of couple of attributes in
 
-    Configuration Payload in IKEv2?", 2004-11-19.  Srinivasa Rao
 
-    Addepalli's mail "INTERNAL_IP4_SUBNET and INTERNAL_IP6_SUBNET in
 
-    IKEv2", 2004-09-10.  Yoav Nir's mail "Re: New I-D: IKEv2
 
-    Clarifications and Implementation Guidelines", 2005-02-07.
 
-    "Clarifications open issue: INTERNAL_IP4_SUBNET/NETMASK" thread,
 
-    April 2005.)
 
- 6.4.  INTERNAL_IP4_NETMASK
 
-    Section 3.15.1 defines the INTERNAL_IP4_NETMASK attribute and says
 
-    that "The internal network's netmask.  Only one netmask is allowed in
 
-    the request and reply messages (e.g., 255.255.255.0) and it MUST be
 
-    used only with an INTERNAL_IP4_ADDRESS attribute".
 
-    However, it is not clear what exactly this attribute means, as the
 
-    concept of "netmask" is not very well defined for point-to-point
 
-    links (unlike multi-access links, where it means "you can reach hosts
 
-    inside this netmask directly using layer 2, instead of sending
 
-    packets via a router").  Even if the operating system's TCP/IP stack
 
-    requires a netmask to be configured, for point-to-point links it
 
-    could be just set to 255.255.255.255.  So, why is this information
 
-    sent in IKEv2?
 
-    One possible interpretation would be that the host is given a whole
 
-    block of IP addresses instead of a single address.  This is also what
 
-    Framed-IP-Netmask does in [RADIUS], the IPCP "subnet mask" extension
 
-    does in PPP [IPCPSubnet], and the prefix length in the IPv6 Framed-
 
-    IPv6-Prefix attribute does in [RADIUS6].  However, nothing in the
 
-    specification supports this interpretation, and discussions on the
 
-    IPsec WG mailing list have confirmed it was not intended.  Section
 
-    3.15.1 also says that multiple addresses are assigned using multiple
 
-    INTERNAL_IP4/6_ADDRESS attributes.
 
-    Currently, this document's interpretation is the following:
 
-    INTERNAL_IP4_NETMASK in a CFG_REPLY means roughly the same thing as
 
-    INTERNAL_IP4_SUBNET containing the same information ("send traffic to
 
-    these addresses through me"), but also implies a link boundary.  For
 
- Eronen & Hoffman             Informational                     [Page 41]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    instance, the client could use its own address and the netmask to
 
-    calculate the broadcast address of the link.  (Whether the gateway
 
-    will actually deliver broadcast packets to other VPN clients and/or
 
-    other nodes connected to this link is another matter.)
 
-    An empty INTERNAL_IP4_NETMASK attribute can be included in a
 
-    CFG_REQUEST to request this information (although the gateway can
 
-    send the information even when not requested).  However, it seems
 
-    that non-empty values for this attribute do not make sense in
 
-    CFG_REQUESTs.
 
-    Fortunately, Section 4 clearly says that a minimal implementation
 
-    does not need to include or understand the INTERNAL_IP4_NETMASK
 
-    attribute, and thus this document recommends that implementations
 
-    should not use the INTERNAL_IP4_NETMASK attribute or assume that the
 
-    other peer supports it.
 
-    (References: Charlie Kaufman's mail "RE: Proposed Last Call based
 
-    revisions to IKEv2", 2004-05-27.  Email discussion with Tero Kivinen,
 
-    Jan 2005.  Yoav Nir's mail "Re: New I-D: IKEv2 Clarifications and
 
-    Implementation Guidelines", 2005-02-07.  "Clarifications open issue:
 
-    INTERNAL_IP4_SUBNET/NETMASK" thread, April 2005.)
 
- 6.5.  Configuration Payloads for IPv6
 
-    IKEv2 also defines configuration payloads for IPv6.  However, they
 
-    are based on the corresponding IPv4 payloads and do not fully follow
 
-    the "normal IPv6 way of doing things".
 
-    A client can be assigned an IPv6 address using the
 
-    INTERNAL_IP6_ADDRESS configuration payload.  A minimal exchange could
 
-    look like this:
 
-         CP(CFG_REQUEST) =
 
-           INTERNAL_IP6_ADDRESS()
 
-           INTERNAL_IP6_DNS()
 
-         TSi = (0, 0-65535, :: - FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF)
 
-         TSr = (0, 0-65535, :: - FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF)
 
-         CP(CFG_REPLY) =
 
-           INTERNAL_IP6_ADDRESS(2001:DB8:0:1:2:3:4:5/64)
 
-           INTERNAL_IP6_DNS(2001:DB8:99:88:77:66:55:44)
 
-         TSi = (0, 0-65535, 2001:DB8:0:1:2:3:4:5 - 2001:DB8:0:1:2:3:4:5)
 
-         TSr = (0, 0-65535, :: - FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF)
 
-    In particular, IPv6 stateless autoconfiguration or router
 
-    advertisement messages are not used; neither is neighbor discovery.
 
- Eronen & Hoffman             Informational                     [Page 42]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    The client can also send a non-empty INTERNAL_IP6_ADDRESS attribute
 
-    in the CFG_REQUEST to request a specific address or interface
 
-    identifier.  The gateway first checks if the specified address is
 
-    acceptable, and if it is, returns that one.  If the address was not
 
-    acceptable, the gateway will attempt to use the interface identifier
 
-    with some other prefix; if even that fails, the gateway will select
 
-    another interface identifier.
 
-    The INTERNAL_IP6_ADDRESS attribute also contains a prefix length
 
-    field.  When used in a CFG_REPLY, this corresponds to the
 
-    INTERNAL_IP4_NETMASK attribute in the IPv4 case (and indeed, was
 
-    called INTERNAL_IP6_NETMASK in earlier versions of the IKEv2 draft).
 
-    See the previous section for more details.
 
-    While this approach to configuring IPv6 addresses is reasonably
 
-    simple, it has some limitations: IPsec tunnels configured using IKEv2
 
-    are not fully-featured "interfaces" in the IPv6 addressing
 
-    architecture [IPv6Addr] sense.  In particular, they do not
 
-    necessarily have link-local addresses, and this may complicate the
 
-    use of protocols that assume them, such as [MLDv2].  (Whether they
 
-    are called "interfaces" in some particular operating system is a
 
-    different issue.)
 
-    (References: "VPN remote host configuration IPv6 ?" thread, May 2004.
 
-    "Clarifications open issue: INTERNAL_IP4_SUBNET/NETMASK" thread,
 
-    April 2005.)
 
- 6.6.  INTERNAL_IP6_NBNS
 
-    Section 3.15.1 defines the INTERNAL_IP6_NBNS attribute for sending
 
-    the IPv6 address of NetBIOS name servers.
 
-    However, NetBIOS is not defined for IPv6 and probably never will be.
 
-    Thus, this attribute most likely does not make much sense.
 
-    (Pointed out by Bernard Aboba in the IP Configuration Security (ICOS)
 
-    BoF at IETF62.)
 
- 6.7.  INTERNAL_ADDRESS_EXPIRY
 
-    Section 3.15.1 defines the INTERNAL_ADDRESS_EXPIRY attribute as
 
-    "Specifies the number of seconds that the host can use the internal
 
-    IP address.  The host MUST renew the IP address before this expiry
 
-    time.  Only one of these attributes MAY be present in the reply."
 
-    Expiry times and explicit renewals are primarily useful in
 
-    environments like DHCP, where the server cannot reliably know when
 
- Eronen & Hoffman             Informational                     [Page 43]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    the client has gone away.  However, in IKEv2 this is known, and the
 
-    gateway can simply free the address when the IKE_SA is deleted.
 
-    Also, Section 4 says that supporting renewals is not mandatory.
 
-    Given that this functionality is usually not needed, we recommend
 
-    that gateways should not send the INTERNAL_ADDRESS_EXPIRY attribute.
 
-    (And since this attribute does not seem to make much sense for
 
-    CFG_REQUESTs, clients should not send it either.)
 
-    Note that according to Section 4, clients are required to understand
 
-    INTERNAL_ADDRESS_EXPIRY if they receive it.  A minimum implementation
 
-    would use the value to limit the lifetime of the IKE_SA.
 
-    (References: Tero Kivinen's mail "Comments of
 
-    draft-eronen-ipsec-ikev2-clarifications-02.txt", 2005-04-05.
 
-    "Questions about internal address" thread, April 2005.)
 
- 6.8.  Address Assignment Failures
 
-    If the responder encounters an error while attempting to assign an IP
 
-    address to the initiator, it responds with an
 
-    INTERNAL_ADDRESS_FAILURE notification as described in Section 3.10.1.
 
-    However, there are some more complex error cases.
 
-    First, if the responder does not support configuration payloads at
 
-    all, it can simply ignore all configuration payloads.  This type of
 
-    implementation never sends INTERNAL_ADDRESS_FAILURE notifications.
 
-    If the initiator requires the assignment of an IP address, it will
 
-    treat a response without CFG_REPLY as an error.
 
-    A second case is where the responder does support configuration
 
-    payloads, but only for particular type of addresses (IPv4 or IPv6).
 
-    Section 4 says that "A minimal IPv4 responder implementation will
 
-    ignore the contents of the CP payload except to determine that it
 
-    includes an INTERNAL_IP4_ADDRESS attribute".  If, for instance, the
 
-    initiator includes both INTERNAL_IP4_ADDRESS and INTERNAL_IP6_ADDRESS
 
-    in the CFG_REQUEST, an IPv4-only responder can thus simply ignore the
 
-    IPv6 part and process the IPv4 request as usual.
 
-    A third case is where the initiator requests multiple addresses of a
 
-    type that the responder supports: what should happen if some (but not
 
-    all) of the requests fail?  It seems that an optimistic approach
 
-    would be the best one here: if the responder is able to assign at
 
-    least one address, it replies with those; it sends
 
-    INTERNAL_ADDRESS_FAILURE only if no addresses can be assigned.
 
-    (References: "ikev2 and internal_ivpn_address" thread, June 2005.)
 
- Eronen & Hoffman             Informational                     [Page 44]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
- 7.  Miscellaneous Issues
 
- 7.1.  Matching ID_IPV4_ADDR and ID_IPV6_ADDR
 
-    When using the ID_IPV4_ADDR/ID_IPV6_ADDR identity types in IDi/IDr
 
-    payloads, IKEv2 does not require this address to match anything in
 
-    the TSi/TSr payloads.  For example, in a site-to-site VPN between two
 
-    security gateways, the gateways could authenticate each other as
 
-    ID_IPV4_ADDR(192.0.1.1) and ID_IPV4_ADDR(192.0.2.1), and then create
 
-    a CHILD_SA for protecting traffic between 192.0.1.55/32 (a host
 
-    behind the first security gateway) and 192.0.2.240/28 (a network
 
-    behind the second security gateway).  The authenticated identities
 
-    (IDi/IDr) are linked to the authorized traffic selectors (TSi/TSr)
 
-    using "Child SA Authorization Data" in the Peer Authorization
 
-    Database (PAD).
 
-    Furthermore, IKEv2 does not require that the addresses in
 
-    ID_IPV4_ADDR/ID_IPV6_ADDR match the address in the IP header of the
 
-    IKE packets.  However, other specifications may place additional
 
-    requirements regarding this.  For example, [PKI4IPsec] requires that
 
-    implementation must be capable of comparing the addresses in the
 
-    ID_IPV4_ADDR/ID_IPV6_ADDR with the addresses in the IP header of the
 
-    IKE packets, and this comparison must be enabled by default.
 
-    (References: "Identities types IP address,FQDN/user FQDN and DN and
 
-    its usage in preshared key authentication" thread, Jan 2005.
 
-    "Matching ID_IPV4_ADDR and ID_IPV6_ADDR" thread, May 2006.)
 
- 7.2.  Relationship of IKEv2 to RFC 4301
 
-    The IKEv2 specification refers to [RFC4301], but it never clearly
 
-    defines the exact relationship.
 
-    However, there are some requirements in the specification that make
 
-    it clear that IKEv2 requires [RFC4301].  In other words, an
 
-    implementation that does IPsec processing strictly according to
 
-    [RFC2401] cannot be compliant with the IKEv2 specification.
 
-    One such example can be found in Section 2.24: "Specifically, tunnel
 
-    encapsulators and decapsulators for all tunnel-mode SAs created by
 
-    IKEv2 [...]  MUST implement the tunnel encapsulation and
 
-    decapsulation processing specified in [RFC4301] to prevent discarding
 
-    of ECN congestion indications."
 
-    Nevertheless, the changes required to existing [RFC2401]
 
-    implementations are not very large, especially since supporting many
 
-    of the new features (such as Extended Sequence Numbers) is optional.
 
- Eronen & Hoffman             Informational                     [Page 45]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
- 7.3.  Reducing the Window Size
 
-    In IKEv2, the window size is assumed to be a (possibly configurable)
 
-    property of a particular implementation and is not related to
 
-    congestion control (unlike the window size in TCP, for instance).
 
-    In particular, it is not defined what the responder should do when it
 
-    receives a SET_WINDOW_SIZE notification containing a smaller value
 
-    than is currently in effect.  Thus, there is currently no way to
 
-    reduce the window size of an existing IKE_SA.  However, when rekeying
 
-    an IKE_SA, the new IKE_SA starts with window size 1 until it is
 
-    explicitly increased by sending a new SET_WINDOW_SIZE notification.
 
-    (References: Tero Kivinen's mail "Comments of
 
-    draft-eronen-ipsec-ikev2-clarifications-02.txt", 2005-04-05.)
 
- 7.4.  Minimum Size of Nonces
 
-    Section 2.10 says that "Nonces used in IKEv2 MUST be randomly chosen,
 
-    MUST be at least 128 bits in size, and MUST be at least half the key
 
-    size of the negotiated prf."
 
-    However, the initiator chooses the nonce before the outcome of the
 
-    negotiation is known.  In this case, the nonce has to be long enough
 
-    for all the PRFs being proposed.
 
- 7.5.  Initial Zero Octets on Port 4500
 
-    It is not clear whether a peer sending an IKE_SA_INIT request on port
 
-    4500 should include the initial four zero octets.  Section 2.23 talks
 
-    about how to upgrade to tunneling over port 4500 after message 2, but
 
-    it does not say what to do if message 1 is sent on port 4500.
 
-        IKE MUST listen on port 4500 as well as port 500.
 
-        [...]
 
-        The IKE initiator MUST check these payloads if present and if
 
-        they do not match the addresses in the outer packet MUST tunnel
 
-        all future IKE and ESP packets associated with this IKE_SA over
 
-        UDP port 4500.
 
-        To tunnel IKE packets over UDP port 4500, the IKE header has four
 
-        octets of zero prepended and the result immediately follows the
 
-        UDP header. [...]
 
- Eronen & Hoffman             Informational                     [Page 46]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    The very beginning of Section 2 says "... though IKE messages may
 
-    also be received on UDP port 4500 with a slightly different format
 
-    (see section 2.23)."
 
-    That "slightly different format" is only described in discussing what
 
-    to do after changing to port 4500.  However, [RFC3948] shows clearly
 
-    the format has the initial zeros even for initiators on port 4500.
 
-    Furthermore, without the initial zeros, the processing engine cannot
 
-    determine whether the packet is an IKE packet or an ESP packet.
 
-    Thus, all packets sent on port 4500 need the four-zero prefix;
 
-    otherwise, the receiver won't know how to handle them.
 
- 7.6.  Destination Port for NAT Traversal
 
-    Section 2.23 says that "an IPsec endpoint that discovers a NAT
 
-    between it and its correspondent MUST send all subsequent traffic to
 
-    and from port 4500".
 
-    This sentence is misleading.  The peer "outside" the NAT uses source
 
-    port 4500 for the traffic it sends, but the destination port is, of
 
-    course, taken from packets sent by the peer behind the NAT.  This
 
-    port number is usually dynamically allocated by the NAT.
 
- 7.7.  SPI Values for Messages outside an IKE_SA
 
-    The IKEv2 specification is not quite clear what SPI values should be
 
-    used in the IKE header for the small number of notifications that are
 
-    allowed to be sent outside an IKE_SA.  Note that such notifications
 
-    are explicitly not Informational exchanges; Section 1.5 makes it
 
-    clear that these are one-way messages that must not be responded to.
 
-    There are two cases when such a one-way notification can be sent:
 
-    INVALID_IKE_SPI and INVALID_SPI.
 
-    In case of INVALID_IKE_SPI, the message sent is a response message,
 
-    and Section 2.21 says that "If a response is sent, the response MUST
 
-    be sent to the IP address and port from whence it came with the same
 
-    IKE SPIs and the Message ID copied."
 
-    In case of INVALID_SPI, however, there are no IKE SPI values that
 
-    would be meaningful to the recipient of such a notification.  Also,
 
-    the message sent is now an INFORMATIONAL request.  A strict
 
-    interpretation of the specification would require the sender to
 
-    invent garbage values for the SPI fields.  However, we think this was
 
-    not the intention, and using zero values is acceptable.
 
-    (References: "INVALID_IKE_SPI" thread, June 2005.)
 
- Eronen & Hoffman             Informational                     [Page 47]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
- 7.8.  Protocol ID/SPI Fields in Notify Payloads
 
-    Section 3.10 says that the Protocol ID field in Notify payloads "For
 
-    notifications that do not relate to an existing SA, this field MUST
 
-    be sent as zero and MUST be ignored on receipt".  However, the
 
-    specification does not clearly say which notifications are related to
 
-    existing SAs and which are not.
 
-    Since the main purpose of the Protocol ID field is to specify the
 
-    type of the SPI, our interpretation is that the Protocol ID field
 
-    should be non-zero only when the SPI field is non-empty.
 
-    There are currently only two notifications where this is the case:
 
-    INVALID_SELECTORS and REKEY_SA.
 
- 7.9.  Which message should contain INITIAL_CONTACT
 
-    The description of the INITIAL_CONTACT notification in Section 3.10.1
 
-    says that "This notification asserts that this IKE_SA is the only
 
-    IKE_SA currently active between the authenticated identities".
 
-    However, neither Section 2.4 nor 3.10.1 says in which message this
 
-    payload should be placed.
 
-    The general agreement is that INITIAL_CONTACT is best communicated in
 
-    the first IKE_AUTH request, not as a separate exchange afterwards.
 
-    (References: "Clarifying the use of INITIAL_CONTACT in IKEv2" thread,
 
-    April 2005.  "Initial Contact messages" thread, December 2004.
 
-    "IKEv2 and Initial Contact" thread, September 2004 and April 2005.)
 
- 7.10.  Alignment of Payloads
 
-    Many IKEv2 payloads contain fields marked as "RESERVED", mostly
 
-    because IKEv1 had them, and partly because they make the pictures
 
-    easier to draw.  In particular, payloads in IKEv2 are not, in
 
-    general, aligned to 4-octet boundaries.  (Note that payloads were not
 
-    aligned to 4-octet boundaries in IKEv1 either.)
 
-    (References: "IKEv2: potential 4-byte alignment problem" thread, June
 
-    2004.)
 
- 7.11.  Key Length Transform Attribute
 
-    Section 3.3.5 says that "The only algorithms defined in this document
 
-    that accept attributes are the AES based encryption, integrity, and
 
-    pseudo-random functions, which require a single attribute specifying
 
-    key width."
 
- Eronen & Hoffman             Informational                     [Page 48]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    This is incorrect.  The AES-based integrity and pseudo-random
 
-    functions defined in [IKEv2] always use a 128-bit key.  In fact,
 
-    there are currently no integrity or PRF algorithms that use the key
 
-    length attribute (and we recommend that they should not be defined in
 
-    the future either).
 
-    For encryption algorithms, the situation is slightly more complex
 
-    since there are three different types of algorithms:
 
-    o  The key length attribute is never used with algorithms that use a
 
-       fixed length key, such as DES and IDEA.
 
-    o  The key length attribute is always included for the currently
 
-       defined AES-based algorithms (Cipher Block Chaining (CBC), Counter
 
-       (CTR) Mode, Counter with CBC-MAC (CCM), and Galois/Counter Mode
 
-       (GCM)).  Omitting the key length attribute is not allowed; if the
 
-       proposal does not contain it, the proposal has to be rejected.
 
-    o  For other algorithms, the key length attribute can be included but
 
-       is not mandatory.  These algorithms include, e.g., RC5, CAST, and
 
-       BLOWFISH.  If the key length attribute is not included, the
 
-       default value specified in [RFC2451] is used.
 
- 7.12.  IPsec IANA Considerations
 
-    There are currently three different IANA registry files that contain
 
-    important numbers for IPsec: ikev2-registry, isakmp-registry, and
 
-    ipsec-registry.  Implementers should note that IKEv2 may use numbers
 
-    different from those of IKEv1 for a particular algorithm.
 
-    For instance, an encryption algorithm can have up to three different
 
-    numbers: the IKEv2 "Transform Type 1" identifier in ikev2-registry,
 
-    the IKEv1 phase 1 "Encryption Algorithm" identifier in ipsec-
 
-    registry, and the IKEv1 phase 2 "IPSEC ESP Transform Identifier"
 
-    isakmp-registry.  Although some algorithms have the same number in
 
-    all three registries, the registries are not identical.
 
-    Similarly, an integrity algorithm can have at least the IKEv2
 
-    "Transform Type 3" identifier in ikev2-registry, the IKEv1 phase 2
 
-    "IPSEC AH Transform Identifier" in isakmp-registry, and the IKEv1
 
-    phase 2 ESP "Authentication Algorithm Security Association Attribute"
 
-    identifier in isakmp-registry.  And there is also the IKEv1 phase 1
 
-    "Hash Algorithm" list in ipsec-registry.
 
-    This issue needs special care also when writing a specification for
 
-    how a new algorithm is used with IPsec.
 
- Eronen & Hoffman             Informational                     [Page 49]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
- 7.13.  Combining ESP and AH
 
-    The IKEv2 specification contains some misleading text about how ESP
 
-    and AH can be combined.
 
-    IKEv2 is based on [RFC4301], which does not include "SA bundles" that
 
-    were part of [RFC2401].  While a single packet can go through IPsec
 
-    processing multiple times, each of these passes uses a separate SA,
 
-    and the passes are coordinated by the forwarding tables.  In IKEv2,
 
-    each of these SAs has to be created using a separate CREATE_CHILD_SA
 
-    exchange.  Thus, the text in Section 2.7 about a single proposal
 
-    containing both ESP and AH is incorrect.
 
-    Moreover, the combination of ESP and AH (between the same endpoints)
 
-    had already become largely obsolete in 1998 when RFC 2406 was
 
-    published.  Our recommendation is that IKEv2 implementations should
 
-    not support this combination, and implementers should not assume the
 
-    combination can be made to work in an interoperable manner.
 
-    (References: "Rekeying SA bundles" thread, Oct 2005.)
 
- 8.  Implementation Mistakes
 
-    Some implementers at the early IKEv2 bakeoffs didn't do everything
 
-    correctly.  This may seem like an obvious statement, but it is
 
-    probably useful to list a few things that were clear in the document,
 
-    but that some implementers didn't do.  All of these things caused
 
-    interoperability problems.
 
-    o  Some implementations continued to send traffic on a CHILD_SA after
 
-       it was rekeyed, even after receiving an DELETE payload.
 
-    o  After rekeying an IKE_SA, some implementations did not reset their
 
-       message counters to zero.  One set the counter to 2, another did
 
-       not reset the counter at all.
 
-    o  Some implementations could only handle a single pair of traffic
 
-       selectors or would only process the first pair in the proposal.
 
-    o  Some implementations responded to a delete request by sending an
 
-       empty INFORMATIONAL response and then initiated their own
 
-       INFORMATIONAL exchange with the pair of SAs to delete.
 
-    o  Although this did not happen at the bakeoff, from the discussion
 
-       there, it is clear that some people had not implemented message
 
-       window sizes correctly.  Some implementations might have sent
 
- Eronen & Hoffman             Informational                     [Page 50]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-       messages that did not fit into the responder's message windows,
 
-       and some implementations may not have torn down an SA if they did
 
-       not ever receive a message that they know they should have.
 
- 9.  Security Considerations
 
-    This document does not introduce any new security considerations to
 
-    IKEv2.  If anything, clarifying complex areas of the specification
 
-    can reduce the likelihood of implementation problems that may have
 
-    security implications.
 
- 10.  Acknowledgments
 
-    This document is mainly based on conversations on the IPsec WG
 
-    mailing list.  The authors would especially like to thank Bernard
 
-    Aboba, Jari Arkko, Vijay Devarapalli, William Dixon, Francis Dupont,
 
-    Alfred Hoenes, Mika Joutsenvirta, Charlie Kaufman, Stephen Kent, Tero
 
-    Kivinen, Yoav Nir, Michael Richardson, and Joel Snyder for their
 
-    contributions.
 
-    In addition, the authors would like to thank all the participants of
 
-    the first public IKEv2 bakeoff, held in Santa Clara in February 2005,
 
-    for their questions and proposed clarifications.
 
- 11.  References
 
- 11.1.  Normative References
 
-    [IKEv2]       Kaufman, C., Ed., "Internet Key Exchange (IKEv2)
 
-                  Protocol", RFC 4306, December 2005.
 
-    [IKEv2ALG]    Schiller, J., "Cryptographic Algorithms for Use in the
 
-                  Internet Key Exchange Version 2 (IKEv2)", RFC 4307,
 
-                  December 2005.
 
-    [PKCS1v20]    Kaliski, B. and J. Staddon, "PKCS #1: RSA Cryptography
 
-                  Specifications Version 2.0", RFC 2437, October 1998.
 
-    [PKCS1v21]    Jonsson, J. and B. Kaliski, "Public-Key Cryptography
 
-                  Standards (PKCS) #1: RSA Cryptography Specifications
 
-                  Version 2.1", RFC 3447, February 2003.
 
-    [RFC2401]     Kent, S. and R. Atkinson, "Security Architecture for
 
-                  the Internet Protocol", RFC 2401, November 1998.
 
-    [RFC4301]     Kent, S. and K. Seo, "Security Architecture for the
 
-                  Internet Protocol", RFC 4301, December 2005.
 
- Eronen & Hoffman             Informational                     [Page 51]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
- 11.2.  Informative References
 
-    [Aura05]      Aura, T., Roe, M., and A. Mohammed, "Experiences with
 
-                  Host-to-Host IPsec", 13th International Workshop on
 
-                  Security Protocols, Cambridge, UK, April 2005.
 
-    [EAP]         Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and
 
-                  H. Levkowetz, "Extensible Authentication Protocol
 
-                  (EAP)", RFC 3748, June 2004.
 
-    [HashUse]     Hoffman, P., "Use of Hash Algorithms in IKE and IPsec",
 
-                  Work in Progress, July 2006.
 
-    [IPCPSubnet]  Cisco Systems, Inc., "IPCP Subnet Mask Support
 
-                  Enhancements",  http://www.cisco.com/univercd/cc/td/
 
-                  doc/product/software/ios121/121newft/121limit/121dc/
 
-                  121dc3/ipcp_msk.htm, January 2003.
 
-    [IPv6Addr]    Hinden, R. and S. Deering, "IP Version 6 Addressing
 
-                  Architecture", RFC 4291, February 2006.
 
-    [MIPv6]       Johnson, D., Perkins, C., and J. Arkko, "Mobility
 
-                  Support in IPv6", RFC 3775, June 2004.
 
-    [MLDv2]       Vida, R. and L. Costa, "Multicast Listener Discovery
 
-                  Version 2 (MLDv2) for IPv6", RFC 3810, June 2004.
 
-    [NAI]         Aboba, B., Beadles, M., Arkko, J., and P. Eronen, "The
 
-                  Network Access Identifier", RFC 4282, December 2005.
 
-    [PKI4IPsec]   Korver, B., "Internet PKI Profile of IKEv1/ISAKMP,
 
-                  IKEv2, and PKIX", Work in Progress, April 2006.
 
-    [RADEAP]      Aboba, B. and P. Calhoun, "RADIUS (Remote
 
-                  Authentication Dial In User Service) Support For
 
-                  Extensible Authentication Protocol (EAP)", RFC 3579,
 
-                  September 2003.
 
-    [RADIUS]      Rigney, C., Willens, S., Rubens, A., and W. Simpson,
 
-                  "Remote Authentication Dial In User Service (RADIUS)",
 
-                  RFC 2865, June 2000.
 
-    [RADIUS6]     Aboba, B., Zorn, G., and D. Mitton, "RADIUS and IPv6",
 
-                  RFC 3162, August 2001.
 
-    [RFC2119]     Bradner, S., "Key words for use in RFCs to Indicate
 
-                  Requirement  Levels", RFC 2119, March 1997.
 
- Eronen & Hoffman             Informational                     [Page 52]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    [RFC2451]     Pereira, R. and R. Adams, "The ESP CBC-Mode Cipher
 
-                  Algorithms", RFC 2451, November 1998.
 
-    [RFC2822]     Resnick, P., "Internet Message Format", RFC 2822,
 
-                  April 2001.
 
-    [RFC3664]     Hoffman, P., "The AES-XCBC-PRF-128 Algorithm for the
 
-                  Internet Key Exchange Protocol (IKE)", RFC 3664,
 
-                  January 2004.
 
-    [RFC3948]     Huttunen, A., Swander, B., Volpe, V., DiBurro, L., and
 
-                  M. Stenberg, "UDP Encapsulation of IPsec ESP Packets",
 
-                  RFC 3948, January 2005.
 
-    [RFC4434]     Hoffman, P., "The AES-XCBC-PRF-128 Algorithm for the
 
-                  Internet Key Exchange Protocol (IKE)", RFC 4434,
 
-                  February 2006.
 
-    [RFC822]      Crocker, D., "Standard for the format of ARPA Internet
 
-                  text messages", RFC 822, August 1982.
 
-    [ReAuth]      Nir, Y., "Repeated Authentication in Internet Key
 
-                  Exchange (IKEv2) Protocol", RFC 4478, April 2006.
 
-    [SCVP]        Freeman, T., Housley, R., Malpani, A., Cooper, D., and
 
-                  T. Polk, "Simple Certificate Validation Protocol
 
-                  (SCVP)", Work in Progress, June 2006.
 
- Eronen & Hoffman             Informational                     [Page 53]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
- Appendix A.  Exchanges and Payloads
 
-    This appendix contains a short summary of the IKEv2 exchanges, and
 
-    what payloads can appear in which message.  This appendix is purely
 
-    informative; if it disagrees with the body of this document or the
 
-    IKEv2 specification, the other text is considered correct.
 
-    Vendor-ID (V) payloads may be included in any place in any message.
 
-    This sequence shows what are, in our opinion, the most logical places
 
-    for them.
 
-    The specification does not say which messages can contain
 
-    N(SET_WINDOW_SIZE).  It can possibly be included in any message, but
 
-    it is not yet shown below.
 
- A.1.  IKE_SA_INIT Exchange
 
-    request             --> [N(COOKIE)],
 
-                            SA, KE, Ni,
 
-                            [N(NAT_DETECTION_SOURCE_IP)+,
 
-                             N(NAT_DETECTION_DESTINATION_IP)],
 
-                            [V+]
 
-    normal response     <-- SA, KE, Nr,
 
-    (no cookie)             [N(NAT_DETECTION_SOURCE_IP),
 
-                             N(NAT_DETECTION_DESTINATION_IP)],
 
-                            [[N(HTTP_CERT_LOOKUP_SUPPORTED)], CERTREQ+],
 
-                            [V+]
 
- A.2.  IKE_AUTH Exchange without EAP
 
-    request             --> IDi, [CERT+],
 
-                            [N(INITIAL_CONTACT)],
 
-                            [[N(HTTP_CERT_LOOKUP_SUPPORTED)], CERTREQ+],
 
-                            [IDr],
 
-                            AUTH,
 
-                            [CP(CFG_REQUEST)],
 
-                            [N(IPCOMP_SUPPORTED)+],
 
-                            [N(USE_TRANSPORT_MODE)],
 
-                            [N(ESP_TFC_PADDING_NOT_SUPPORTED)],
 
-                            [N(NON_FIRST_FRAGMENTS_ALSO)],
 
-                            SA, TSi, TSr,
 
-                            [V+]
 
- Eronen & Hoffman             Informational                     [Page 54]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
-    response            <-- IDr, [CERT+],
 
-                            AUTH,
 
-                            [CP(CFG_REPLY)],
 
-                            [N(IPCOMP_SUPPORTED)],
 
-                            [N(USE_TRANSPORT_MODE)],
 
-                            [N(ESP_TFC_PADDING_NOT_SUPPORTED)],
 
-                            [N(NON_FIRST_FRAGMENTS_ALSO)],
 
-                            SA, TSi, TSr,
 
-                            [N(ADDITIONAL_TS_POSSIBLE)],
 
-                            [V+]
 
- A.3.  IKE_AUTH Exchange with EAP
 
-    first request       --> IDi,
 
-                            [N(INITIAL_CONTACT)],
 
-                            [[N(HTTP_CERT_LOOKUP_SUPPORTED)], CERTREQ+],
 
-                            [IDr],
 
-                            [CP(CFG_REQUEST)],
 
-                            [N(IPCOMP_SUPPORTED)+],
 
-                            [N(USE_TRANSPORT_MODE)],
 
-                            [N(ESP_TFC_PADDING_NOT_SUPPORTED)],
 
-                            [N(NON_FIRST_FRAGMENTS_ALSO)],
 
-                            SA, TSi, TSr,
 
-                            [V+]
 
-    first response      <-- IDr, [CERT+], AUTH,
 
-                            EAP,
 
-                            [V+]
 
-                      / --> EAP
 
-    repeat 1..N times |
 
-                      \ <-- EAP
 
-    last request        --> AUTH
 
-    last response       <-- AUTH,
 
-                            [CP(CFG_REPLY)],
 
-                            [N(IPCOMP_SUPPORTED)],
 
-                            [N(USE_TRANSPORT_MODE)],
 
-                            [N(ESP_TFC_PADDING_NOT_SUPPORTED)],
 
-                            [N(NON_FIRST_FRAGMENTS_ALSO)],
 
-                            SA, TSi, TSr,
 
-                            [N(ADDITIONAL_TS_POSSIBLE)],
 
-                            [V+]
 
- Eronen & Hoffman             Informational                     [Page 55]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
- A.4.  CREATE_CHILD_SA Exchange for Creating/Rekeying CHILD_SAs
 
-    request             --> [N(REKEY_SA)],
 
-                            [N(IPCOMP_SUPPORTED)+],
 
-                            [N(USE_TRANSPORT_MODE)],
 
-                            [N(ESP_TFC_PADDING_NOT_SUPPORTED)],
 
-                            [N(NON_FIRST_FRAGMENTS_ALSO)],
 
-                            SA, Ni, [KEi], TSi, TSr
 
-    response            <-- [N(IPCOMP_SUPPORTED)],
 
-                            [N(USE_TRANSPORT_MODE)],
 
-                            [N(ESP_TFC_PADDING_NOT_SUPPORTED)],
 
-                            [N(NON_FIRST_FRAGMENTS_ALSO)],
 
-                            SA, Nr, [KEr], TSi, TSr,
 
-                            [N(ADDITIONAL_TS_POSSIBLE)]
 
- A.5.  CREATE_CHILD_SA Exchange for Rekeying the IKE_SA
 
-    request             --> SA, Ni, [KEi]
 
-    response            <-- SA, Nr, [KEr]
 
- A.6.  INFORMATIONAL Exchange
 
-    request             --> [N+],
 
-                            [D+],
 
-                            [CP(CFG_REQUEST)]
 
-    response            <-- [N+],
 
-                            [D+],
 
-                            [CP(CFG_REPLY)]
 
- Eronen & Hoffman             Informational                     [Page 56]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
- Authors' Addresses
 
-    Pasi Eronen
 
-    Nokia Research Center
 
-    P.O. Box 407
 
-    FIN-00045 Nokia Group
 
-    Finland
 
-    EMail: pasi.eronen@nokia.com
 
-    Paul Hoffman
 
-    VPN Consortium
 
-    127 Segre Place
 
-    Santa Cruz, CA 95060
 
-    USA
 
-    EMail: paul.hoffman@vpnc.org
 
- Eronen & Hoffman             Informational                     [Page 57]
 
- RFC 4718                  IKEv2 Clarifications              October 2006
 
- Full Copyright Statement
 
-    Copyright (C) The Internet Society (2006).
 
-    This document is subject to the rights, licenses and restrictions
 
-    contained in BCP 78, and except as set forth therein, the authors
 
-    retain all their rights.
 
-    This document and the information contained herein are provided on an
 
-    "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
 
-    OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
 
-    ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
 
-    INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
 
-    INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
 
-    WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
 
- Intellectual Property
 
-    The IETF takes no position regarding the validity or scope of any
 
-    Intellectual Property Rights or other rights that might be claimed to
 
-    pertain to the implementation or use of the technology described in
 
-    this document or the extent to which any license under such rights
 
-    might or might not be available; nor does it represent that it has
 
-    made any independent effort to identify any such rights.  Information
 
-    on the procedures with respect to rights in RFC documents can be
 
-    found in BCP 78 and BCP 79.
 
-    Copies of IPR disclosures made to the IETF Secretariat and any
 
-    assurances of licenses to be made available, or the result of an
 
-    attempt made to obtain a general license or permission for the use of
 
-    such proprietary rights by implementers or users of this
 
-    specification can be obtained from the IETF on-line IPR repository at
 
-    http://www.ietf.org/ipr.
 
-    The IETF invites any interested party to bring to its attention any
 
-    copyrights, patents or patent applications, or other proprietary
 
-    rights that may cover technology that may be required to implement
 
-    this standard.  Please address the information to the IETF at
 
-    ietf-ipr@ietf.org.
 
- Acknowledgement
 
-    Funding for the RFC Editor function is provided by the IETF
 
-    Administrative Support Activity (IASA).
 
- Eronen & Hoffman             Informational                     [Page 58]
 
 
  |