Hi Raj Matt is correct. There is no way in IKEv2 to do a phase1-only exchange, and then wait for traffic to establish the child SAs.
While we do establish an IKE SA if the piggy-backed child SA failed for whatever reason (bad selectors, no proposal chosen), we don't allow for an IKE_AUTH exchange that is missing the child payloads. An IKE_AUTH request without the TSi and TSr payloads is considered malformed, and so MUST NOT be processed. Instead, you should reply with INVALID_SYNTAX As to question 2, the text refers to a child SA creation that failed, not to one that was never attempted. Of course it is possible to generate that effect - propose non-existant cryptographic algorithms, or IPv7 addresses in the selectors, but that IMO is a misuse of the protocol. Yoav Raj Singh wrote: Hi Matt, Let me re-phrase my questions: 1. If there is no TSi and TSr payload in IKE_AUTH exchange, whether we go ahead and process IKE_AUTH payloads or not ? 2. Appendix C: IKE_AUTH: Error in CHILD SA creation. It will come into picture if we process the packet. If we go ahead and process the packet, according to appendix C, we SHOULD/MUST establish the IKE SA ? Looks like, if we go ahead to process the IKE_AUTH packet with no TSi and TSr, we can establish the IKEv2 SA. I request more experts to comment. Thanks for your reply. Regards, Raj On Wed, Apr 22, 2009 at 12:08 PM, Matthew Cini Sarreo <mci...@gmail.com<mailto:mci...@gmail.com>> wrote: Hello Raj, According to Appendix C, for IKE_AUTH: error in Child SA <-- IDr, [CERT+], creation AUTH, N(error), [V+] So sending an authenticated and encrypted INVALID_SYNTAX notification over the IKE_SA that has just been authenticated seems to be correct. Regards, Matt 2009/4/22 raj singh <rsjen...@gmail.com<mailto:rsjen...@gmail.com>> Hi Matt, There is possibility of just IKEv2 SA gets established during IKE_AUTH and IPsec SA getting established via CREATE_CHILD_SA. The question is what behavior RFC mandate ? What you think ? Thanks for your reply. Regards, Raj On Wed, Apr 22, 2009 at 11:40 AM, Matthew Cini Sarreo <mci...@gmail.com<mailto:mci...@gmail.com>> wrote: In IKE_AUTH TSi and TSr are mandatory, so it is not possible to omit them from an authentication exchange message, as there would be no way for the SA to know what traffic should be forwarded through the SA. It seems that the correct error message would be INVALID_SYNTAX. This would require the message ID and the checksum to be valid. Note that this has (may only) be sent in an encrypted response. Please correct me if I am wrong. Regards, Matt 2009/4/22 raj singh <rsjen...@gmail.com<mailto:rsjen...@gmail.com>> Hi Group, What is the expected behavior if as a responder we do not receive TSi and TSr in IKE_AUTH exchange ? Shall we go ahead and establish IKEv2 SA ? If yes, shall we send out TSi and TSr ? Or we should reject the packet ? If we reject the packet during packet validation with doing ID and AUTH payload processing, what ERROR should be send ? Thanks, Raj _______________________________________________ IPsec mailing list IPsec@ietf.org<mailto:IPsec@ietf.org> https://www.ietf.org/mailman/listinfo/ipsec Email secured by Check Point
_______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec