25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

KE This is the key exchange payload that carries the<br />

public Diffie-Hellman value chosen by Host-A, g qm x .<br />

There is also a field called Group that indicates the<br />

prime number <strong>and</strong> generator used in the<br />

Diffie-Hellman exchange.<br />

ID payload Specifies the endpoints for this SA.<br />

IKE phase 2, message 2<br />

After Host-B receives message 1 from Host-A <strong>and</strong> successfully authenticates it<br />

using HASH_1, it constructs a reply, message 2, to be sent back to Host-A. The<br />

Message ID of the reply is the same one that Host-A used in message 1.<br />

Host-B chooses new values for the following:<br />

Hash The hash payload now carries the value HASH_2,<br />

which is defined as:<br />

HASH_2 = prf(SKEYID_a, N qmi , M-ID, SA, N qmr , KE, ID qmi , ID qmr )<br />

Security Association The Security Association payload only describes the<br />

single chosen proposal <strong>and</strong> its associated transforms,<br />

not all of the protection suites offered by Host-A.<br />

Host-B also chooses an SPI value for the selected<br />

protocol. Host-B's SPI does not depend in any way on<br />

the SPI that Host-A assigned to that protocol when it<br />

offered the proposal. That is, it is not necessary that<br />

SPI A be the same as SPI B ; it is only necessary that<br />

they each be non-zero <strong>and</strong> that they each be r<strong>and</strong>omly<br />

chosen.<br />

Nonce Nonce payload now carries N r, a r<strong>and</strong>om value chosen<br />

by Host-B.<br />

KE Key exchange payload now carries Host-B's public<br />

Diffie-Hellman value, g qm y .<br />

At this point, Host-A <strong>and</strong> Host-B have exchanged<br />

nonces <strong>and</strong> public Diffie-Hellman values. Each one<br />

can use this in conjunction with other information to<br />

derive a pair of keys, one for each direction of<br />

transmission.<br />

Chapter 22. <strong>TCP</strong>/<strong>IP</strong> security 843

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!