Hi

The only case I could imagine that this could occur is if the Initiators
Nonce and KE were purposely made very small and the Initiator did not
perform any validation on this, sending it¹s own reply where the KE and
Nonce were considerably larger.

I¹ve seen an amplification attack, where an implementation (as a
responder) would reply to a SA_INIT. If the responder did not receive a
reply to its SA_INIT it would re-transmit either 3 or 5 times (can¹t
remember exactly). (this seemed to not conform to 2.1 retransmission
timers..

cheers

On 05/03/2016 13:11, "IPsec on behalf of Valery Smyslov"
<[email protected] on behalf of [email protected]> wrote:

>IKE_SA_INIT reply in most cases is smaller than request.
>The responder returns only a subset of initiator's SA transforms,
>a subset of initiator's  notifications (returning only supported ones),
>and usually only a subset of VIDs.
>In which real life scenario it is larger than request?

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to