Hi The only case I could imagine that this could occur is if the Initiators Nonce and KE were purposely made very small and the Initiator did not perform any validation on this, sending it¹s own reply where the KE and Nonce were considerably larger.
I¹ve seen an amplification attack, where an implementation (as a responder) would reply to a SA_INIT. If the responder did not receive a reply to its SA_INIT it would re-transmit either 3 or 5 times (can¹t remember exactly). (this seemed to not conform to 2.1 retransmission timers.. cheers On 05/03/2016 13:11, "IPsec on behalf of Valery Smyslov" <[email protected] on behalf of [email protected]> wrote: >IKE_SA_INIT reply in most cases is smaller than request. >The responder returns only a subset of initiator's SA transforms, >a subset of initiator's notifications (returning only supported ones), >and usually only a subset of VIDs. >In which real life scenario it is larger than request?
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ IPsec mailing list [email protected] https://www.ietf.org/mailman/listinfo/ipsec
