Generally, for authentication and PRF purposes, IKEv1 uses HMAC forms of 
authentication algorithms.  For most algorithms (e.g., MD5, SHA1, etc.) 
there is both a non-keyed form of the hash and also a keyed HMAC form. 
This doesn't seem to be true for AES-XCBC, which is explicitly defined as 
a keyed hash function.

RFC 3947 documents the use of a non-keyed hash for generating a NAT-D 
payload.  It says that "this uses the negotiated HASH algorithm".  What 
hash algorithm should one use if AES-XCBC is being used for 
authentication?

(Fortunately, IKEv2 does not have this problem; it explicitly specifies 
the use of SHA-1 for the NAT_DETECTION_* payloads.)


Scott Moonen ([email protected])
z/OS Communications Server TCP/IP Development
http://scott.andstuff.org/
http://www.linkedin.com/in/smoonen
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to