I noticed a minor problem in section 5:
  "When not using extensible authentication, the peers are authenticated
  by having each sign (or MAC using a padded shared secret as the key,
  as described later in this section) a block of data.

But the padding is not described later in the section. 

I will reword the section as follows:
"5. Authentication Data for Reauthenticating the IKE SA

When not using extensible authentication, the peers are authenticated by 
having each sign (or MAC using a padded shared secret as the key) a block 
of data as described in [IKEv2] Section 2.15 except for the following 
differences: 

   o For the modified IKE_AUTH request, the octets to be signed start with 
the first octet of the previous Authentication payload sent by the 
initiator and end with the last octet of that payload. 

   o For the modified IKE_AUTH response, the octets to be signed start 
with the first octet of the previous Authentication payload sent by the 
responder and end with the last octet of that payload."


Keith Welter
IBM z/OS Communications Server Developer
1-415-545-2694 (T/L: 473-2694)
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to