Hi,

 

Section 2.8 of rfc-5996 states handling for rekeying. The text-

>From a technical correctness and interoperability perspective, the

   responder MAY begin sending on an SA as soon as it sends its response

   to the CREATE_CHILD_SA request.  In some situations, however, this

   could result in packets unnecessarily being dropped, so an

   implementation MAY defer such sending.

 

   The responder can be assured that the initiator is prepared to

   receive messages on an SA if either (1) it has received a

   cryptographically valid message on the other half of the SA pair, or

   (2) the new SA rekeys an existing SA and it receives an IKE request

   to close the replaced SA.  When rekeying an SA, the responder

   continues to send traffic on the old SA until one of those events

   occurs.  When establishing a new SA, the responder MAY defer sending

   messages on a new SA until either it receives one or a timeout has

   occurred.  If an initiator receives a message on an SA for which it

   has not received a response to its CREATE_CHILD_SA request, it

   interprets that as a likely packet loss and retransmits the

   CREATE_CHILD_SA request.  An initiator MAY send a dummy ESP message

   on a newly created ESP SA if it has no messages queued in order to

   assure the responder that the initiator is ready to receive messages.

 

After initiating a rekey or responding to a rekey, 

Is it correct to say, that any request should continue to be sent on old
SA until you receive a DELETE request or you send a DELETE request

to delete the rekeyed SA?

The new SA should only be used after the old SA gets deleted.

 

Regards,

Prashant

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to