Vandana Brar wrote:
Interoperating with Sun Solaris, it is not clear how the keys are getting generated on the solaris side of things. With an RFC compliant implementation of the key generation on a peer device, we can confirm that the following components of the key are the same:

- SKEYID
- SKEYID_a
- SKEYID_d
- SKEYID_e
- Encryption key

However, from solaris debugging command currently provided (ikeadm dump p1), the* **encryption IV* does not match during the initiation messaging (phase 1 SA setup exchange)

The RFC details are (RFC2409 Appendix B) :
" ….
In phase 1, material for the initialization vector (IV material) for
CBC mode encryption algorithms is derived from a hash of a
concatenation of the initiator's public Diffie-Hellman value and the
responder's public Diffie-Hellman value using the negotiated hash
algorithm.
…."

We have a standards compliant ike implementation which *does* generate the IV per RFC2409. And I can confirm it *does* successfully negotiate a set of keys with Solaris 10 iked. I don't know whether that is of any assistance ;-).

We use exactly the same algorithm to successfully establish keys with cisco, nortel, sonicwall and racoon peers :-)

Regards
Paul Winder
_______________________________________________
opensolaris-code mailing list
[email protected]
http://mail.opensolaris.org/mailman/listinfo/opensolaris-code

Reply via email to