25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Proposal Payload Host-B's Proposal Payload specifies the protocol<br />

PROTO_ISAKMP <strong>and</strong> sets the SPI value to 0.<br />

Transform Payload The Transform Payload specifies KEY_OAKLEY. For<br />

the KEY_OAKLEY transform, the attributes that were<br />

accepted from the proposal offered by Host-A are<br />

copied into the appropriate fields.<br />

At this point, the properties of the ISAKMP Security Association have been<br />

agreed to by Host-A <strong>and</strong> Host-B. The identity of the ISAKMP SA has been set<br />

equal to the pair . However, the identities of the parties<br />

claiming to be Host-A <strong>and</strong> Host-B have not yet been authoritatively verified.<br />

IKE phase 1, message 3<br />

The third message of the phase 1 ISAKMP exchange begins the exchange of the<br />

information from which the cryptographic keys will eventually be derived (see<br />

Figure 22-39 on page 836).<br />

The ISAKMP payload exchanges two types of information.<br />

Important: None of the messages themselves carry the actual cryptographic<br />

keys. Instead, they carry inputs that will be used by Host-A <strong>and</strong> Host-B to<br />

derive the keys locally.<br />

Diffie-Hellman public value<br />

The Diffie-Hellman public value g x from the initiator.<br />

The exponent x in the public value is the private value<br />

that must be kept secret.<br />

Nonce The nonce N i from the initiator. (Nonce is a name for a<br />

value that is considered to be r<strong>and</strong>om according to<br />

some very strict mathematical guidelines.)<br />

ID If the RSA public key is used for authentication, the<br />

nonces are encrypted with the public key of the other<br />

party. Likewise for the IDs of either party, which are<br />

then also exchanged at this stage.<br />

If authentication with revised RSA public key is used,<br />

the KE <strong>and</strong> ID payloads are encrypted with a secret<br />

key that is derived from the nonces <strong>and</strong> the encryption<br />

algorithm agreed to in messages 1 <strong>and</strong> 2, thus<br />

avoiding one CPU-intensive public key operation.<br />

Chapter 22. <strong>TCP</strong>/<strong>IP</strong> security 835

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!