I noticed a minor problem in section 5: "When not using extensible authentication, the peers are authenticated by having each sign (or MAC using a padded shared secret as the key, as described later in this section) a block of data.
But the padding is not described later in the section. I will reword the section as follows: "5. Authentication Data for Reauthenticating the IKE SA When not using extensible authentication, the peers are authenticated by having each sign (or MAC using a padded shared secret as the key) a block of data as described in [IKEv2] Section 2.15 except for the following differences: o For the modified IKE_AUTH request, the octets to be signed start with the first octet of the previous Authentication payload sent by the initiator and end with the last octet of that payload. o For the modified IKE_AUTH response, the octets to be signed start with the first octet of the previous Authentication payload sent by the responder and end with the last octet of that payload." Keith Welter IBM z/OS Communications Server Developer 1-415-545-2694 (T/L: 473-2694)
_______________________________________________ IPsec mailing list [email protected] https://www.ietf.org/mailman/listinfo/ipsec
