25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Hash A Hash payload must immediately follow the ISAKMP<br />

header. HASH_1 uses the keyed pseudo-r<strong>and</strong>om<br />

function that was negotiated during the phase 1<br />

exchanges, <strong>and</strong> is derived from the following<br />

information:<br />

842 <strong>TCP</strong>/<strong>IP</strong> <strong>Tutorial</strong> <strong>and</strong> <strong>Technical</strong> <strong>Overview</strong><br />

HASH_1 = prf(SKEYID_a, M-ID, SA, N qmi , KE, ID qmi , ID qmr )<br />

SKEYID_a was derived from the phase 1<br />

exchanges.<br />

M-ID is the message ID of this message.<br />

SA is the Security Association payload carried in this<br />

message, including all proposals that were offered.<br />

Nonce is a new value different from the one used in<br />

phase 1.<br />

KE is the public Diffie-Hellman value carried in this<br />

message. This quantity is chosen by Host-A, <strong>and</strong> is<br />

denoted as g qm x . Note that this is not the same<br />

quantity as g x that was used in the phase 1<br />

exchanges.<br />

IDs, which can identify either the endpoints of the<br />

phase 1 exchange or endpoints on whose behalf the<br />

protocol SA should be negotiated (proxy IDs when<br />

IKE is used in client mode). These can subsequently<br />

be different from the IDs used in phase 1.<br />

Note: The use of KE <strong>and</strong> ID is optional, depending if PFS is used.<br />

Security Association Indicates <strong>IP</strong> as the Domain of Interpretation.<br />

Proposal, Transform Pairs<br />

There can be one or more of these pairs in this<br />

message. The first proposal payload is numbered 1,<br />

identifies an <strong>IP</strong>Sec protocol to be used, <strong>and</strong> includes<br />

an SPI value that is r<strong>and</strong>omly chosen by Host-A for<br />

use with that protocol. The proposal payload is<br />

followed by a single transform payload that indicates<br />

the cryptographic algorithm to be used with that<br />

protocol. The second proposal payload is numbered 2,<br />

<strong>and</strong> so on.<br />

Nonce payload This contains the nonce N qmi that was chosen<br />

r<strong>and</strong>omly by Host-A.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!