25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

IKE phase 1, message 6<br />

After receiving message 5 from Host-A, Host-B verifies the identity of Host-A by<br />

validating the hash.<br />

If digital signatures were used for authentication, the signature of this hash are<br />

verified by Host-B.<br />

If this is successful, Host-B sends message 6 to Host-A to allow Host-A to verify<br />

the identity of Host-B.<br />

The structure of message 6 is the same as that of message 5, with the obvious<br />

changes that the identity payload <strong>and</strong> the certificate payload now pertain to<br />

Host-B:<br />

HASH_R = prf(SKEYID, g y , g x , CookieB, CookieA, SA p , ID B )<br />

Notice that the order in which Diffie-Hellman public values <strong>and</strong> the cookies<br />

appear has been changed, <strong>and</strong> the final term now is the identity payload that<br />

Host-B has included in message 6.<br />

If digital signatures were used for authentication, this hash is also signed by<br />

Host-B, which is different from the one previously signed by Host-A.<br />

When Host-A receives message 6 <strong>and</strong> verifies the hash or digital signature, the<br />

phase 1 exchanges are then complete. At this point, each participant has<br />

authenticated itself to its peer. Both have agreed on the characteristics of the<br />

ISAKMP Security Associations, <strong>and</strong> both have derived the same set of keys (or<br />

keying material).<br />

Miscellaneous phase 1 facts<br />

There are several miscellaneous facts worth noting:<br />

► Regardless of the specific authentication mechanism that is used, there will<br />

be six messages exchanged for the Oakley Main Mode. However, the content<br />

of the individual messages differs, depending on the authentication method.<br />

► Although Oakley exchanges make use of both encryption <strong>and</strong> authentication,<br />

they do not use either <strong>IP</strong>Sec's ESP or AH protocol. ISAKMP exchanges are<br />

protected with application-layer security mechanisms, not with network-layer<br />

security mechanisms.<br />

► ISAKMP messages are sent using UDP. There is no guaranteed delivery for<br />

them.<br />

► The only way to identify that an ISAKMP message is part of a phase 1 flow<br />

rather than a phase 2 flow is to check the Message ID field in the ISAKMP<br />

header. For phase 1 flows, it must be 0, <strong>and</strong> (although not explicitly stated in<br />

the ISAKMP documents) for phase 2 flows, it must be non-zero.<br />

Chapter 22. <strong>TCP</strong>/<strong>IP</strong> security 839

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!