Hi Matt,

I agree with Jeff.
Sending INVALID_SYNTAX notify with no payload and immediately delete IKEv2
SA  will be good idea in case of malformed IKE_AUTH  request.
As SA is still unauthenticated, sending DELETE notify will cause another
problems.

Thanks,
Raj

On Thu, Apr 23, 2009 at 2:04 AM, J. Sun <jsun2...@gmail.com> wrote:

> Matt,
>  In respect to a Notify ERROR TYPES & the IKE_AUTH response with IDr,
> [CERT+] & AUTH payload inclusion, NO_PROPOSAL_CHOSEN, SINGLE_PAIR_REQUIRED,
>  TS_UNACCEPTABLE and NO_ADDITIONAL_SAS are Notify ERROR TYPES that would
> generally still include the IDr, [CERT+] & AUTH payload in the response.
>  In respect to the INVALID_SYNTAX & the IKE_AUTH Response, it's really up
> to the implementation to decide what to do next in respect to receiving a
> malformed IKE_AUTH Request.  One option is suggested by Tero - sending an
> IKE_AUTH Response with an INVALID_SYNTAX and no other payloads.  Another
> option is to simply drop the malformed IKE_AUTH Request and not even send a
> reply.  The point is, there's not much you can really do when a device sends
> you a malformed request/response message - it's not like it's gonna figure
> out what's wrong and fix it.  Whichever option that you go with, you'll have
> to eventually locally delete the unauthenticated IKE_SA - I would not
> continue operating as if the IKE_SA is authenticated by initializing a
> INFORMATIONAL Request with Delete Payloads.  RFC 4306 does not define what
> to do in such cases, and essentially leaves it up to implementations to
> decide on how to handle it - in other words, there isn't a specified way to
> handle every oddball case out there.
>
> - Jeff Sun
>
> Matthew Cini Sarreo wrote:
>
>> Hello all,
>>
>> As IKEv2bis-02 defines in Appendix C, the proper way to notify a requester
>> that there was an error in creating a Child SA using the IKE_AUTH exchange
>> is:
>>
>> error in Child SA  <--  IDr, [CERT+],
>> creation                AUTH,
>>                           N(error),
>>                           [V+]
>>
>> A point came up about this in a previous thread today (IKE_AUTH without
>> TSi, TSr), where an initator would send IKE_AUTH without TSi, TSr. It seemed
>> that a general agreement was to send an INVALID_SYNTAX message without the
>> IDr and AUTH payloads. As it was put:
>>
>> >INVALID_SYNTAX is fatal error meaning that other end didn't follow the
>> >protocol specification, and the IKE SA is going to be removed anyways,
>> >and there is not really point of putting AUTH payload there (it can be
>> > there, but there is no need).
>>
>> > If the other end is not following protocol specification (i.e. is
>> > non-complient), there is not really point of trying to be nice. This
>> > is something that cannot be seen by normal customers ever, it should
>> > only be seen by the implementors when they are testing against broken
>> > implementations.
>>
>> >So better just send error message back as it is easiest for your
>> > implementation (i.e. if it is easy to include AUTH etc to the error
>> > message, then do so, if not, then leave them out).
>>
>> The above seems reasonable to me.
>>
>> What would be the reasoning for adding IDr, [CERT+], AUTH in this
>> scenario? Would it be possible/acceptable to some better text covering
>> INVALID_SYNTAX? Maybe it would specify that when INVALID_SYNTAX would be
>> sent, no other payloads are needed, and what would happen to the SA. Would
>> the SA be interrupted (removed from memory instantly without any
>> confirmation by the party sending the notification), an Informational
>> exchange to delete the SA be initiated or would the party sending
>> INVALID_SYNTAX allow the other endpoint to take some action when receiving
>> this error (maybe the initiator would give up and start an Informational
>> Exchange to delete the SA)?
>>
>> Regards,
>> Matt
>> ------------------------------------------------------------------------
>>
>> _______________________________________________
>> IPsec mailing list
>> IPsec@ietf.org
>> https://www.ietf.org/mailman/listinfo/ipsec
>>
>>
>
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
>
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to