Yoav Nir writes:
> I'm sorry I just noticed this, but is this even allowed? Can you
> include multiple key length attributes in the same transform?
Yes, you are right, you cannot include multiple key length attributes,
as they would be AND for all of them. So yes, they need to be separate
transform each of them.
Here is my fixed proposal picture:
----------------------------------------------------------------------
SA Payload
|
+------------------+---------------------------+
| |
| |
Proposal #1 Proposal #2
Proto ID = ESP (3) Proto ID = ESP (3)
SPI size = 4 SPI size = 4
7 transforms 4 transforms
SPI = 0x95903423 SPI = 0x12345678
| |
+------+-+----+------+------+------+------+ +------+------+------+
| | | | | | | | | | |
Trans Trans Trans Trans Trans Trans Trans Trans Trans Trans Trans
form form form form form form form form form form form
ENCR INTEG ENCR INTEG ENCR ESN ESN ENCR ESN ENCR ESN
ENCR AUTH ENCR AUTH ENCR No Use AES- No AES- Use
_AES _HMAC _AES _AES _AES ESN ESN GCM ESN GCM ESN
_CBC _SHA1 _CBC _XCBC _CBC 0 1 w/8 0 w/8 1
| _96 | _96 | octet octet
| | | ICV ICV
| | | | |
| | | | |
Attribute Attribute Attribute Attribute Attribute
Key Length Key Length Key Length Key Length Key Length
128 192 256 128 256
----------------------------------------------------------------------
> The initiator of an exchange MUST check that the
> accepted offer is consistent with one of its proposals, and if not
> that response MUST be rejected.
>
> BTW: how do you reject a response?
Silently drop the negotiation (or just the packet if this is
IKE_SA_INIT) with the peer, as it is clearly not following the
specification, and this is not a problem that will be fixed by
changing configuration or similar, it does require software update of
the other end.
--
[email protected]
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec