Hi Matt.

You can't initiate INFORMATIONAL exchanges before the IKE_AUTH exchange(s) 
concluded successfully. 

Section 2.3 prohibits sending INVALID_MESSAGE_ID in responses, so you don't use 
that for the IKE_AUTH exchange.

If the IKE_AUTH exchange contains invalid message IDs, these requests MUST be 
ignored. I don't think you ever begin to use the message window until after the 
IKE_AUTH exchange, and INVALID_MESSAGE_ID is not some kind of MALFORMED_PACKET. 
It's specifically to tell the other side about window problems.

Hope this helps

Yoav

> -----Original Message-----
> From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] 
> On Behalf Of Matthew Cini Sarreo
> Sent: Monday, April 20, 2009 10:10 AM
> To: ipsec@ietf.org
> Subject: [IPsec] IKEv2 INVALID_MESSAGE_ID
> 
> If an implementation decides to send the INVALID_MESSAGE_ID 
> notification, shoild it ONLY send this after an IKE_AUTH 
> exchange has been completed? It seems to be so as section 2.3 
> states that an INFORMATIONAL exchange is started, but it is 
> not clear what should be done if a message of the two initial 
> exchanges has an invalid message id (an implementation should 
> always use 0 for IKE_SA_INIT and 1 for IKE_AUTH, but what if 
> this does not happen?)
> 

Email secured by Check Point
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to