25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

authority using a protocol such as LDAP, or it can query a secure DNS server, or<br />

it can maintain a secure local cache that maps previously used certificates to<br />

their respective ID values, or it can send an ISAKMP Certificate Request<br />

message to its peer, who must then immediately send its certificate to the<br />

requester.<br />

Note: The method for obtaining a certificate is a local option, <strong>and</strong> is not<br />

defined as part of IKE. In particular, it is a local responsibility of the receiver to<br />

check that the certificate in question is still valid <strong>and</strong> has not been revoked.<br />

There are several points to bear in mind:<br />

► At this stage of the process, all ISAKMP payloads, whether in phase 1 or<br />

phase 2, are encrypted, using the encryption algorithm (negotiated in<br />

messages 1 <strong>and</strong> 2) <strong>and</strong> the keys (derived from the information in messages 3<br />

<strong>and</strong> 4). The ISAKMP header itself, however, is still transmitted in the clear.<br />

► In phase 1, <strong>IP</strong>Sec's ESP protocol is not used; that is, there is no ESP header.<br />

The recipient uses the encryption bit in the Flags field of the ISAKMP header<br />

to determine if encryption has been applied to the message. The pair of<br />

values , which serve as an SPI for phase 1 exchanges,<br />

provide a pointer to the correct algorithm <strong>and</strong> key to be used to decrypt the<br />

message.<br />

► The digital signature, if used, is not applied to the ISAKMP message itself.<br />

Instead, it is applied to a hash of information that is available to both Host-A<br />

<strong>and</strong> Host-B.<br />

► The identity carried in the identity payload does not necessarily bear any<br />

relationship to the source <strong>IP</strong> address; however, the identity carried in the<br />

identity payload must be the identity to which the certificate, if used, applies.<br />

Host-A (the initiator) generates the following hash function, <strong>and</strong> then places the<br />

result in the Signature Payload field:<br />

HASH_I = prf(SKEYID, g x , g y , CookieA, CookieB, SA p, ID A)<br />

If digital signatures were used for authentication, this hash will also be signed by<br />

Host-A.<br />

ID A is Host-A's identity information that was transmitted in the identity payload of<br />

this message, <strong>and</strong> SA p is the entire body of the SA payload that was sent by<br />

Host-A in message 1, including all proposals <strong>and</strong> all transforms proposed by<br />

Host-A. The cookies, public Diffie-Hellman values, <strong>and</strong> SKEYID were explicitly<br />

carried in messages 1 through 4, or were derived from their contents.<br />

838 <strong>TCP</strong>/<strong>IP</strong> <strong>Tutorial</strong> <strong>and</strong> <strong>Technical</strong> <strong>Overview</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!